In the Linux kernel, the following vulnerability has been resolved: cifs: fix use-after-free bug in refreshcacheworker() The UAF bug occurred because we were putting DFS root sessions in cifsumount() while DFS cache refresher was being executed. Make DFS root sessions have same lifetime as DFS tcons so we can avoid the use-after-free bug is DFS cache refresher and other places that require IPCs to get new DFS referrals on. Also, get rid of mount group handling in DFS cache as we no longer need it. This fixes below use-after-free bug catched by KASAN [ 379.946955] BUG: KASAN: use-after-free in refreshtcon.isra.0+0x10b/0xc10 [cifs] [ 379.947642] Read of size 8 at addr ffff888018f57030 by task kworker/u4:3/56 [ 379.948096] [ 379.948208] CPU: 0 PID: 56 Comm: kworker/u4:3 Not tainted 6.2.0-rc7-lku #23 [ 379.948661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552-rebuilt.opensuse.org 04/01/2014 [ 379.949368] Workqueue: cifs-dfscache refreshcacheworker [cifs] [ 379.949942] Call Trace: [ 379.950113] <TASK> [ 379.950260] dumpstacklvl+0x50/0x67 [ 379.950510] printreport+0x16a/0x48e [ 379.950759] ? _virtaddrvalid+0xd8/0x160 [ 379.951040] ? _physaddr+0x41/0x80 [ 379.951285] kasanreport+0xdb/0x110 [ 379.951533] ? _refreshtcon.isra.0+0x10b/0xc10 [cifs] [ 379.952056] ? _refreshtcon.isra.0+0x10b/0xc10 [cifs] [ 379.952585] _refreshtcon.isra.0+0x10b/0xc10 [cifs] [ 379.953096] ? _pfxrefreshtcon.isra.0+0x10/0x10 [cifs] [ 379.953637] ? pfxmutexlock+0x10/0x10 [ 379.953915] ? lockrelease+0xb6/0x720 [ 379.954167] ? _pfxlockacquire+0x10/0x10 [ 379.954443] ? refreshcacheworker+0x34e/0x6d0 [cifs] [ 379.954960] ? _pfxwbworkfn+0x10/0x10 [ 379.955239] refreshcacheworker+0x4ad/0x6d0 [cifs] [ 379.955755] ? _pfxrefreshcacheworker+0x10/0x10 [cifs] [ 379.956323] ? _pfxlockacquired+0x10/0x10 [ 379.956615] ? readwordatatime+0xe/0x20 [ 379.956898] ? lockdephardirqsonprepare+0x12/0x220 [ 379.957235] processonework+0x535/0x990 [ 379.957509] ? _pfxprocessonework+0x10/0x10 [ 379.957812] ? lockacquired+0xb7/0x5f0 [ 379.958069] ? _listaddvalid+0x37/0xd0 [ 379.958341] ? _listaddvalid+0x37/0xd0 [ 379.958611] workerthread+0x8e/0x630 [ 379.958861] ? _pfxworkerthread+0x10/0x10 [ 379.959148] kthread+0x17d/0x1b0 [ 379.959369] ? _pfxkthread+0x10/0x10 [ 379.959630] retfromfork+0x2c/0x50 [ 379.959879] </TASK>
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "block-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "block-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "crypto-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "crypto-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "fat-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "fat-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "fb-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "firewire-core-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "floppy-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "fs-core-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "fs-core-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "fs-secondary-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "fs-secondary-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "input-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "input-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "ipmi-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "ipmi-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "irda-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "irda-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "kernel-image-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "kernel-image-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-doc", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-headers-3.11.0-12", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-headers-3.11.0-12-generic", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-headers-3.11.0-12-generic-lpae", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-image-3.11.0-12-generic", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-image-3.11.0-12-generic-lpae", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-image-extra-3.11.0-12-generic", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-libc-dev", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-source-3.11.0", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-tools-3.11.0-12", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-tools-3.11.0-12-generic", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-tools-3.11.0-12-generic-lpae", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-tools-common", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-udebs-generic", "binary_version": "3.11.0-12.19" }, { "binary_name": "linux-udebs-generic-lpae", "binary_version": "3.11.0-12.19" }, { "binary_name": "md-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "md-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "message-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "mouse-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "mouse-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "multipath-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "multipath-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nfs-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nfs-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nic-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nic-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nic-pcmcia-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nic-shared-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nic-shared-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nic-usb-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "nic-usb-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "parport-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "parport-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "pata-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "pcmcia-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "pcmcia-storage-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "plip-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "plip-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "ppp-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "ppp-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "sata-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "sata-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "scsi-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "scsi-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "serial-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "speakup-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "speakup-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "squashfs-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "squashfs-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "storage-core-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "storage-core-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "usb-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "usb-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "virtio-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "vlan-modules-3.11.0-12-generic-di", "binary_version": "3.11.0-12.19" }, { "binary_name": "vlan-modules-3.11.0-12-generic-lpae-di", "binary_version": "3.11.0-12.19" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-4.4.0-1002", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-aws-cloud-tools-4.4.0-1002-dbgsym", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-aws-headers-4.4.0-1002", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-aws-tools-4.4.0-1002", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-aws-tools-4.4.0-1002-dbgsym", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-cloud-tools-4.4.0-1002-aws", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-headers-4.4.0-1002-aws", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-image-4.4.0-1002-aws", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-image-4.4.0-1002-aws-dbgsym", "binary_version": "4.4.0-1002.2" }, { "binary_name": "linux-tools-4.4.0-1002-aws", "binary_version": "4.4.0-1002.2" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-4.15.0-1023", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-azure-cloud-tools-4.15.0-1023-dbgsym", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-azure-headers-4.15.0-1023", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-azure-tools-4.15.0-1023", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-azure-tools-4.15.0-1023-dbgsym", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-cloud-tools-4.15.0-1023-azure", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-headers-4.15.0-1023-azure", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1023-azure", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1023-azure-dbgsym", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-modules-4.15.0-1023-azure", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-1023-azure", "binary_version": "4.15.0-1023.24~14.04.1" }, { "binary_name": "linux-tools-4.15.0-1023-azure", "binary_version": "4.15.0-1023.24~14.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "block-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "block-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "block-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "block-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "block-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "crypto-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "crypto-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "crypto-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "crypto-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "crypto-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fat-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fat-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fat-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fat-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fat-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fb-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "firewire-core-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "firewire-core-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "firewire-core-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "firewire-core-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "floppy-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "floppy-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "floppy-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "floppy-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-core-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-core-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-core-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-core-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-core-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-secondary-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-secondary-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-secondary-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-secondary-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "fs-secondary-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "input-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "input-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "input-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "input-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "input-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ipmi-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ipmi-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ipmi-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ipmi-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ipmi-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "irda-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "irda-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "irda-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "irda-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "irda-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "kernel-image-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "kernel-image-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "kernel-image-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "kernel-image-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "kernel-image-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-cloud-tools-4.4.0-13-generic", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-cloud-tools-4.4.0-13-lowlatency", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13-generic", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13-generic-lpae", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13-lowlatency", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13-powerpc-e500mc", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13-powerpc-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13-powerpc64-emb", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-headers-4.4.0-13-powerpc64-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-generic", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-generic-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-generic-lpae", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-generic-lpae-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-lowlatency", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-lowlatency-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc-e500mc", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc-e500mc-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc-smp-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc64-emb", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc64-emb-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc64-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-4.4.0-13-powerpc64-smp-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-image-extra-4.4.0-13-generic", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-13", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-13-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-tools-4.4.0-13", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-tools-4.4.0-13-dbgsym", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-udebs-generic", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-udebs-generic-lpae", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-udebs-powerpc-e500mc", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-udebs-powerpc-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-lts-xenial-udebs-powerpc64-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-tools-4.4.0-13-generic", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-tools-4.4.0-13-generic-lpae", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-tools-4.4.0-13-lowlatency", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-tools-4.4.0-13-powerpc-e500mc", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-tools-4.4.0-13-powerpc-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-tools-4.4.0-13-powerpc64-emb", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "linux-tools-4.4.0-13-powerpc64-smp", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "md-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "md-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "md-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "md-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "md-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "message-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "message-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "message-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "message-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "mouse-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "mouse-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "mouse-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "mouse-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "mouse-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "multipath-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "multipath-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "multipath-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "multipath-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "multipath-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nfs-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nfs-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nfs-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nfs-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nfs-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-pcmcia-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-shared-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-shared-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-shared-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-shared-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-shared-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-usb-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-usb-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-usb-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-usb-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "nic-usb-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "parport-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "parport-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "parport-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "parport-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "parport-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "pata-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "pata-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "pata-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "pata-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "pcmcia-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "pcmcia-storage-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "plip-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "plip-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "plip-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "plip-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "plip-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ppp-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ppp-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ppp-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ppp-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "ppp-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "sata-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "sata-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "sata-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "sata-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "sata-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "scsi-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "scsi-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "scsi-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "scsi-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "scsi-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "serial-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "speakup-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "speakup-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "speakup-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "speakup-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "speakup-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "squashfs-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "squashfs-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "squashfs-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "squashfs-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "squashfs-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "storage-core-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "storage-core-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "storage-core-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "storage-core-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "storage-core-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "usb-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "usb-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "usb-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "usb-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "usb-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "virtio-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "virtio-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "virtio-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "virtio-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "vlan-modules-4.4.0-13-generic-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "vlan-modules-4.4.0-13-generic-lpae-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "vlan-modules-4.4.0-13-powerpc-e500mc-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "vlan-modules-4.4.0-13-powerpc-smp-di", "binary_version": "4.4.0-13.29~14.04.1" }, { "binary_name": "vlan-modules-4.4.0-13-powerpc64-smp-di", "binary_version": "4.4.0-13.29~14.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "block-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "block-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "block-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "block-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "block-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "crypto-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "crypto-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "crypto-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "crypto-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "crypto-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "dasd-extra-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "dasd-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fat-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fat-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fat-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fat-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fat-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fb-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "firewire-core-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "firewire-core-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "firewire-core-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "firewire-core-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "floppy-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "floppy-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "floppy-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "floppy-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-core-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-core-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-core-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-core-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-core-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-secondary-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-secondary-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-secondary-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-secondary-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "fs-secondary-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "input-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "input-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "input-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "input-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "input-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ipmi-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ipmi-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ipmi-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ipmi-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ipmi-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "irda-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "irda-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "irda-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "irda-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "irda-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "kernel-image-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "kernel-image-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "kernel-image-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "kernel-image-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "kernel-image-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-cloud-tools-4.4.0-2", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-cloud-tools-4.4.0-2-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-cloud-tools-4.4.0-2-generic", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-cloud-tools-4.4.0-2-lowlatency", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-doc", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2-generic", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2-generic-lpae", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2-lowlatency", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2-powerpc-e500mc", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2-powerpc-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2-powerpc64-emb", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-headers-4.4.0-2-powerpc64-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-generic", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-generic-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-generic-lpae", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-generic-lpae-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-lowlatency", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-lowlatency-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc-e500mc", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc-e500mc-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc-smp-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc64-emb", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc64-emb-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc64-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-4.4.0-2-powerpc64-smp-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-image-extra-4.4.0-2-generic", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-libc-dev", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-source-4.4.0", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-dbgsym", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-generic", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-generic-lpae", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-lowlatency", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-powerpc-e500mc", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-powerpc-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-powerpc64-emb", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-4.4.0-2-powerpc64-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-tools-common", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-udebs-generic", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-udebs-generic-lpae", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-udebs-powerpc-e500mc", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-udebs-powerpc-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "linux-udebs-powerpc64-smp", "binary_version": "4.4.0-2.16" }, { "binary_name": "md-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "md-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "md-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "md-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "md-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "message-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "message-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "message-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "message-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "mouse-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "mouse-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "mouse-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "mouse-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "mouse-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "multipath-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "multipath-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "multipath-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "multipath-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "multipath-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nfs-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nfs-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nfs-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nfs-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nfs-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-pcmcia-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-shared-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-shared-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-shared-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-shared-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-shared-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-usb-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-usb-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-usb-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-usb-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "nic-usb-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "parport-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "parport-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "parport-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "parport-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "parport-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "pata-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "pata-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "pata-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "pata-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "pcmcia-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "pcmcia-storage-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "plip-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "plip-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "plip-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "plip-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "plip-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ppp-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ppp-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ppp-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ppp-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "ppp-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "sata-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "sata-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "sata-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "sata-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "sata-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "scsi-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "scsi-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "scsi-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "scsi-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "scsi-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "serial-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "speakup-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "speakup-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "speakup-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "speakup-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "speakup-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "squashfs-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "squashfs-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "squashfs-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "squashfs-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "squashfs-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "storage-core-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "storage-core-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "storage-core-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "storage-core-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "storage-core-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "usb-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "usb-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "usb-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "usb-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "usb-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "virtio-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "virtio-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "virtio-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "virtio-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "vlan-modules-4.4.0-2-generic-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "vlan-modules-4.4.0-2-generic-lpae-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "vlan-modules-4.4.0-2-powerpc-e500mc-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "vlan-modules-4.4.0-2-powerpc-smp-di", "binary_version": "4.4.0-2.16" }, { "binary_name": "vlan-modules-4.4.0-2-powerpc64-smp-di", "binary_version": "4.4.0-2.16" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-4.4.0-1001", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-aws-cloud-tools-4.4.0-1001-dbgsym", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-aws-cloud-tools-common", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-aws-headers-4.4.0-1001", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-aws-source-4.4.0", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-aws-tools-4.4.0-1001", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-aws-tools-4.4.0-1001-dbgsym", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-aws-tools-common", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-cloud-tools-4.4.0-1001-aws", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-headers-4.4.0-1001-aws", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-image-4.4.0-1001-aws", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-image-4.4.0-1001-aws-dbgsym", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-image-extra-4.4.0-1001-aws", "binary_version": "4.4.0-1001.10" }, { "binary_name": "linux-tools-4.4.0-1001-aws", "binary_version": "4.4.0-1001.10" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-headers-4.15.0-1031", "binary_version": "4.15.0-1031.33~16.04.1" }, { "binary_name": "linux-aws-hwe-tools-4.15.0-1031", "binary_version": "4.15.0-1031.33~16.04.1" }, { "binary_name": "linux-buildinfo-4.15.0-1031-aws", "binary_version": "4.15.0-1031.33~16.04.1" }, { "binary_name": "linux-headers-4.15.0-1031-aws", "binary_version": "4.15.0-1031.33~16.04.1" }, { "binary_name": "linux-image-4.15.0-1031-aws", "binary_version": "4.15.0-1031.33~16.04.1" }, { "binary_name": "linux-image-4.15.0-1031-aws-dbgsym", "binary_version": "4.15.0-1031.33~16.04.1" }, { "binary_name": "linux-modules-4.15.0-1031-aws", "binary_version": "4.15.0-1031.33~16.04.1" }, { "binary_name": "linux-tools-4.15.0-1031-aws", "binary_version": "4.15.0-1031.33~16.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-4.11.0-1015", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-azure-cloud-tools-4.11.0-1015-dbgsym", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-azure-headers-4.11.0-1015", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-azure-tools-4.11.0-1015", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-azure-tools-4.11.0-1015-dbgsym", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-cloud-tools-4.11.0-1015-azure", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-headers-4.11.0-1015-azure", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-image-4.11.0-1015-azure", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-image-4.11.0-1015-azure-dbgsym", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-image-extra-4.11.0-1015-azure", "binary_version": "4.11.0-1015.15" }, { "binary_name": "linux-tools-4.11.0-1015-azure", "binary_version": "4.11.0-1015.15" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-cloud-tools-4.10.0-1004-gcp", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-gcp-cloud-tools-4.10.0-1004", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-gcp-cloud-tools-4.10.0-1004-dbgsym", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-gcp-headers-4.10.0-1004", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-gcp-tools-4.10.0-1004", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-gcp-tools-4.10.0-1004-dbgsym", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-headers-4.10.0-1004-gcp", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-image-4.10.0-1004-gcp", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-image-4.10.0-1004-gcp-dbgsym", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-image-extra-4.10.0-1004-gcp", "binary_version": "4.10.0-1004.4" }, { "binary_name": "linux-tools-4.10.0-1004-gcp", "binary_version": "4.10.0-1004.4" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "block-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "block-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "crypto-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "crypto-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "dasd-extra-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "dasd-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "fat-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "fat-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "fb-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "firewire-core-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "floppy-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "fs-core-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "fs-core-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "fs-secondary-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "fs-secondary-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "input-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "input-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "ipmi-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "ipmi-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "irda-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "irda-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "kernel-image-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "kernel-image-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-cloud-tools-4.8.0-39-generic", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-cloud-tools-4.8.0-39-lowlatency", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-headers-4.8.0-39", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-headers-4.8.0-39-generic", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-headers-4.8.0-39-generic-lpae", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-headers-4.8.0-39-lowlatency", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-hwe-cloud-tools-4.8.0-39", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-hwe-cloud-tools-4.8.0-39-dbgsym", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-hwe-tools-4.8.0-39", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-hwe-tools-4.8.0-39-dbgsym", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-hwe-udebs-generic", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-hwe-udebs-generic-lpae", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-image-4.8.0-39-generic", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-image-4.8.0-39-generic-dbgsym", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-image-4.8.0-39-generic-lpae", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-image-4.8.0-39-generic-lpae-dbgsym", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-image-4.8.0-39-lowlatency", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-image-4.8.0-39-lowlatency-dbgsym", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-image-extra-4.8.0-39-generic", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-source-4.8.0", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-tools-4.8.0-39-generic", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-tools-4.8.0-39-generic-lpae", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "linux-tools-4.8.0-39-lowlatency", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "md-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "md-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "message-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "mouse-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "mouse-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "multipath-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "multipath-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nfs-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nfs-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nic-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nic-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nic-pcmcia-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nic-shared-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nic-shared-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nic-usb-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "nic-usb-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "parport-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "parport-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "pata-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "pcmcia-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "pcmcia-storage-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "plip-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "plip-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "ppp-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "ppp-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "sata-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "sata-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "scsi-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "scsi-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "serial-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "storage-core-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "storage-core-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "usb-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "usb-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "virtio-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "vlan-modules-4.8.0-39-generic-di", "binary_version": "4.8.0-39.42~16.04.1" }, { "binary_name": "vlan-modules-4.8.0-39-generic-lpae-di", "binary_version": "4.8.0-39.42~16.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-cloud-tools-4.4.0-1007-kvm", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-headers-4.4.0-1007-kvm", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-image-4.4.0-1007-kvm", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-image-4.4.0-1007-kvm-dbgsym", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-kvm-cloud-tools-4.4.0-1007", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-kvm-cloud-tools-4.4.0-1007-dbgsym", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-kvm-headers-4.4.0-1007", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-kvm-tools-4.4.0-1007", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-kvm-tools-4.4.0-1007-dbgsym", "binary_version": "4.4.0-1007.12" }, { "binary_name": "linux-tools-4.4.0-1007-kvm", "binary_version": "4.4.0-1007.12" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-headers-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1008-oracle-dbgsym", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-modules-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-oracle-headers-4.15.0-1008", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-oracle-tools-4.15.0-1008", "binary_version": "4.15.0-1008.10~16.04.1" }, { "binary_name": "linux-tools-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10~16.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "block-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "crypto-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "dasd-extra-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "dasd-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "fat-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "fb-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "firewire-core-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "floppy-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "fs-core-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "fs-secondary-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "input-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "ipmi-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "irda-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "kernel-image-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-fips-cloud-tools-common", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-fips-headers-4.4.0-1003", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-fips-source-4.4.0", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-fips-tools-4.4.0-1003", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-fips-tools-4.4.0-1003-dbgsym", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-headers-4.4.0-1003-fips", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-image-4.4.0-1003-fips", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-image-4.4.0-1003-fips-dbgsym", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-image-extra-4.4.0-1003-fips", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-image-hmac-4.4.0-1003-fips", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-tools-4.4.0-1003-fips", "binary_version": "4.4.0-1003.3" }, { "binary_name": "linux-udebs-fips", "binary_version": "4.4.0-1003.3" }, { "binary_name": "md-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "message-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "mouse-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "multipath-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "nfs-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "nic-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "nic-pcmcia-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "nic-shared-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "nic-usb-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "parport-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "pata-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "pcmcia-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "pcmcia-storage-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "plip-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "ppp-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "sata-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "scsi-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "serial-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "speakup-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "storage-core-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "usb-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "virtio-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" }, { "binary_name": "vlan-modules-4.4.0-1003-fips-di", "binary_version": "4.4.0-1003.3" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "block-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "crypto-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "dasd-extra-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "dasd-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "fat-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "fb-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "firewire-core-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "floppy-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "fs-core-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "fs-secondary-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "input-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "ipmi-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "irda-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "kernel-image-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-fips-headers-4.4.0-1001", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-fips-source-4.4.0", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-fips-tools-4.4.0-1001", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-fips-tools-4.4.0-1001-dbgsym", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-headers-4.4.0-1001-fips", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-image-4.4.0-1001-fips", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-image-4.4.0-1001-fips-dbgsym", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-image-extra-4.4.0-1001-fips", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-image-hmac-4.4.0-1001-fips", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-tools-4.4.0-1001-fips", "binary_version": "4.4.0-1001.1" }, { "binary_name": "linux-udebs-fips", "binary_version": "4.4.0-1001.1" }, { "binary_name": "md-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "message-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "mouse-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "multipath-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "nfs-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "nic-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "nic-pcmcia-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "nic-shared-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "nic-usb-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "parport-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "pata-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "pcmcia-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "pcmcia-storage-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "plip-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "ppp-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "sata-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "scsi-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "serial-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "speakup-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "storage-core-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "usb-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "virtio-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" }, { "binary_name": "vlan-modules-4.4.0-1001-fips-di", "binary_version": "4.4.0-1001.1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "block-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "block-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "crypto-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "crypto-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "dasd-extra-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "dasd-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "fat-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "fat-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "fb-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "firewire-core-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "floppy-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "fs-core-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "fs-core-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "fs-secondary-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "fs-secondary-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "input-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "input-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "ipmi-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "ipmi-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "irda-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "irda-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "kernel-image-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "kernel-image-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-cloud-tools-4.13.0-16", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-cloud-tools-4.13.0-16-dbgsym", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-cloud-tools-4.13.0-16-generic", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-cloud-tools-4.13.0-16-lowlatency", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-doc", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-headers-4.13.0-16", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-headers-4.13.0-16-generic", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-headers-4.13.0-16-generic-lpae", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-headers-4.13.0-16-lowlatency", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-image-4.13.0-16-generic", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-image-4.13.0-16-generic-dbgsym", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-image-4.13.0-16-generic-lpae", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-image-4.13.0-16-generic-lpae-dbgsym", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-image-4.13.0-16-lowlatency", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-image-4.13.0-16-lowlatency-dbgsym", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-image-extra-4.13.0-16-generic", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-libc-dev", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-source-4.13.0", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-tools-4.13.0-16", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-tools-4.13.0-16-dbgsym", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-tools-4.13.0-16-generic", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-tools-4.13.0-16-generic-lpae", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-tools-4.13.0-16-lowlatency", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-tools-common", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-udebs-generic", "binary_version": "4.13.0-16.19" }, { "binary_name": "linux-udebs-generic-lpae", "binary_version": "4.13.0-16.19" }, { "binary_name": "md-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "md-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "message-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "mouse-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "mouse-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "multipath-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "multipath-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nfs-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nfs-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nic-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nic-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nic-pcmcia-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nic-shared-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nic-shared-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nic-usb-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "nic-usb-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "parport-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "parport-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "pata-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "pcmcia-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "pcmcia-storage-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "plip-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "plip-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "ppp-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "ppp-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "sata-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "sata-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "scsi-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "scsi-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "serial-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "storage-core-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "storage-core-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "usb-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "usb-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "virtio-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "vlan-modules-4.13.0-16-generic-di", "binary_version": "4.13.0-16.19" }, { "binary_name": "vlan-modules-4.13.0-16-generic-lpae-di", "binary_version": "4.13.0-16.19" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-4.15.0-1001", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-aws-cloud-tools-4.15.0-1001-dbgsym", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-aws-headers-4.15.0-1001", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-aws-tools-4.15.0-1001", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-aws-tools-4.15.0-1001-dbgsym", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-cloud-tools-4.15.0-1001-aws", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-headers-4.15.0-1001-aws", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-image-4.15.0-1001-aws", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-image-4.15.0-1001-aws-dbgsym", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-tools-4.15.0-1001-aws", "binary_version": "4.15.0-1001.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1082", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-azure-4.15-headers-4.15.0-1082", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-azure-4.15-tools-4.15.0-1082", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-buildinfo-4.15.0-1082-azure", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-cloud-tools-4.15.0-1082-azure", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-headers-4.15.0-1082-azure", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-image-unsigned-4.15.0-1082-azure", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-image-unsigned-4.15.0-1082-azure-dbgsym", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-modules-4.15.0-1082-azure", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-modules-extra-4.15.0-1082-azure", "binary_version": "4.15.0-1082.92" }, { "binary_name": "linux-tools-4.15.0-1082-azure", "binary_version": "4.15.0-1082.92" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1071-gcp", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-gcp-4.15-headers-4.15.0-1071", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-gcp-4.15-tools-4.15.0-1071", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-headers-4.15.0-1071-gcp", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-image-unsigned-4.15.0-1071-gcp", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-image-unsigned-4.15.0-1071-gcp-dbgsym", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-modules-4.15.0-1071-gcp", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-modules-extra-4.15.0-1071-gcp", "binary_version": "4.15.0-1071.81" }, { "binary_name": "linux-tools-4.15.0-1071-gcp", "binary_version": "4.15.0-1071.81" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-cloud-tools-4.15.0-1002-kvm", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-headers-4.15.0-1002-kvm", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-4.15.0-1002-kvm", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-4.15.0-1002-kvm-dbgsym", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-kvm-cloud-tools-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-kvm-cloud-tools-4.15.0-1002-dbgsym", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-kvm-headers-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-kvm-tools-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-kvm-tools-4.15.0-1002-dbgsym", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-tools-4.15.0-1002-kvm", "binary_version": "4.15.0-1002.2" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-headers-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-image-unsigned-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-image-unsigned-4.15.0-1008-oracle-dbgsym", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-modules-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-modules-extra-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-oracle-headers-4.15.0-1008", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-oracle-tools-4.15.0-1008", "binary_version": "4.15.0-1008.10" }, { "binary_name": "linux-tools-4.15.0-1008-oracle", "binary_version": "4.15.0-1008.10" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-fips-headers-4.15.0-2000", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-aws-fips-tools-4.15.0-2000", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-buildinfo-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-headers-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips-dbgsym", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-modules-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-modules-extra-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-tools-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-azure-fips-headers-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-azure-fips-tools-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-buildinfo-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-headers-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips-dbgsym", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-modules-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-modules-extra-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-tools-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-fips-headers-4.15.0-1027", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-fips-tools-4.15.0-1027", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-fips-tools-host", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-headers-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-image-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-image-4.15.0-1027-fips-dbgsym", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-image-hmac-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-image-unsigned-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-image-unsigned-4.15.0-1027-fips-dbgsym", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-modules-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-modules-extra-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" }, { "binary_name": "linux-tools-4.15.0-1027-fips", "binary_version": "4.15.0-1027.32" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-2013-gcp-fips", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-gcp-fips-headers-4.15.0-2013", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-gcp-fips-tools-4.15.0-2013", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-headers-4.15.0-2013-gcp-fips", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-image-unsigned-4.15.0-2013-gcp-fips", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-image-unsigned-4.15.0-2013-gcp-fips-dbgsym", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-2013-gcp-fips", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-modules-4.15.0-2013-gcp-fips", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-modules-extra-4.15.0-2013-gcp-fips", "binary_version": "4.15.0-2013.14" }, { "binary_name": "linux-tools-4.15.0-2013-gcp-fips", "binary_version": "4.15.0-2013.14" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-fips-headers-4.15.0-2000", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-aws-fips-tools-4.15.0-2000", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-buildinfo-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-headers-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips-dbgsym", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-modules-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-modules-extra-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" }, { "binary_name": "linux-tools-4.15.0-2000-aws-fips", "binary_version": "4.15.0-2000.4" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-azure-fips-headers-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-azure-fips-tools-4.15.0-1002", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-buildinfo-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-headers-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips-dbgsym", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-modules-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-modules-extra-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" }, { "binary_name": "linux-tools-4.15.0-1002-azure-fips", "binary_version": "4.15.0-1002.2" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-fips-headers-4.15.0-1011", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-fips-tools-4.15.0-1011", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-fips-tools-host", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-headers-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-image-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-image-4.15.0-1011-fips-dbgsym", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-image-hmac-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-image-unsigned-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-image-unsigned-4.15.0-1011-fips-dbgsym", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-modules-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-modules-extra-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" }, { "binary_name": "linux-tools-4.15.0-1011-fips", "binary_version": "4.15.0-1011.12" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1001-gcp-fips", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-gcp-fips-headers-4.15.0-1001", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-gcp-fips-tools-4.15.0-1001", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-headers-4.15.0-1001-gcp-fips", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips-dbgsym", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-1001-gcp-fips", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-modules-4.15.0-1001-gcp-fips", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-modules-extra-4.15.0-1001-gcp-fips", "binary_version": "4.15.0-1001.1" }, { "binary_name": "linux-tools-4.15.0-1001-gcp-fips", "binary_version": "4.15.0-1001.1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1051", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-azure-5.15-headers-5.15.0-1051", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-azure-5.15-tools-5.15.0-1051", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1051-azure-dbgsym", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59~20.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde", "binary_version": "5.15.0-1019.24~20.04.1.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde-dbgsym", "binary_version": "5.15.0-1019.24~20.04.1.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1009", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-aws-6.8-headers-6.8.0-1009", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-aws-6.8-tools-6.8.0-1009", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-buildinfo-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-cloud-tools-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-headers-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1009-aws-dbgsym", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-modules-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-modules-extra-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" }, { "binary_name": "linux-tools-6.8.0-1009-aws", "binary_version": "6.8.0-1009.9~22.04.2" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-5.15.0-1051", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-azure-headers-5.15.0-1051", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-azure-tools-5.15.0-1051", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-buildinfo-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-cloud-tools-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-headers-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-image-unsigned-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-image-unsigned-5.15.0-1051-azure-dbgsym", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-modules-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-modules-extra-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59" }, { "binary_name": "linux-tools-5.15.0-1051-azure", "binary_version": "5.15.0-1051.59" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1008", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-azure-6.8-headers-6.8.0-1008", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-azure-6.8-tools-6.8.0-1008", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-azure-dbgsym", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1008-azure", "binary_version": "6.8.0-1008.8~22.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1010-gcp", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-gcp-6.8-headers-6.8.0-1010", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-gcp-6.8-tools-6.8.0-1010", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1010-gcp", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1010-gcp", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1010-gcp-dbgsym", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1010-gcp", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1010-gcp", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1010-gcp", "binary_version": "6.8.0-1010.11~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1010-gcp", "binary_version": "6.8.0-1010.11~22.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-38-generic-64k", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-headers-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-headers-6.8.0-38-generic-64k", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-38", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-hwe-6.8-headers-6.8.0-38", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-hwe-6.8-tools-6.8.0-38", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-image-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-image-6.8.0-38-generic-dbgsym", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-38-generic-64k", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-38-generic-64k-dbgsym", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-38-generic-dbgsym", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-modules-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-modules-6.8.0-38-generic-64k", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-modules-ipu6-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-modules-usbio-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-tools-6.8.0-38-generic", "binary_version": "6.8.0-38.38~22.04.1" }, { "binary_name": "linux-tools-6.8.0-38-generic-64k", "binary_version": "6.8.0-38.38~22.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-buildinfo-6.8.0-38-lowlatency-64k", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-cloud-tools-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-headers-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-headers-6.8.0-38-lowlatency-64k", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-64k", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-64k-dbgsym", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-dbgsym", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-38", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-38", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-38", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-modules-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-modules-6.8.0-38-lowlatency-64k", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-tools-6.8.0-38-lowlatency", "binary_version": "6.8.0-38.38.1~22.04.2" }, { "binary_name": "linux-tools-6.8.0-38-lowlatency-64k", "binary_version": "6.8.0-38.38.1~22.04.2" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1008-nvidia", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1008-nvidia-64k", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1008-nvidia", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1008-nvidia-64k", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-64k", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-64k-dbgsym", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-dbgsym", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1008-nvidia", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1008-nvidia-64k", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1008-nvidia", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1008-nvidia", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-nvidia-6.8-headers-6.8.0-1008", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-nvidia-6.8-tools-6.8.0-1008", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-nvidia-6.8-tools-host", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1008-nvidia", "binary_version": "6.8.0-1008.8~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1008-nvidia-64k", "binary_version": "6.8.0-1008.8~22.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1006-oracle", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-buildinfo-6.8.0-1006-oracle-64k", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-headers-6.8.0-1006-oracle", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-headers-6.8.0-1006-oracle-64k", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-oracle", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-64k", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-64k-dbgsym", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-dbgsym", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-modules-6.8.0-1006-oracle", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-modules-6.8.0-1006-oracle-64k", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-modules-extra-6.8.0-1006-oracle", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-modules-extra-6.8.0-1006-oracle-64k", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1006-oracle", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-oracle-6.8-headers-6.8.0-1006", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-oracle-6.8-tools-6.8.0-1006", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-tools-6.8.0-1006-oracle", "binary_version": "6.8.0-1006.6~22.04.3" }, { "binary_name": "linux-tools-6.8.0-1006-oracle-64k", "binary_version": "6.8.0-1006.6~22.04.3" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-38-generic", "binary_version": "6.8.0-38.38.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-38-generic", "binary_version": "6.8.0-38.38.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-38-generic", "binary_version": "6.8.0-38.38.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-38-generic-dbgsym", "binary_version": "6.8.0-38.38.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-38-generic", "binary_version": "6.8.0-38.38.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-headers-6.8.0-38", "binary_version": "6.8.0-38.38.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-tools-6.8.0-38", "binary_version": "6.8.0-38.38.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-38-generic", "binary_version": "6.8.0-38.38.1~22.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1053", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-azure-fips-headers-5.15.0-1053", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-azure-fips-tools-5.15.0-1053", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-headers-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips-dbgsym", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-modules-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" }, { "binary_name": "linux-tools-5.15.0-1053-azure-fips", "binary_version": "5.15.0-1053.61+fips1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1058", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-azure-fips-headers-5.15.0-1058", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-azure-fips-tools-5.15.0-1058", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-headers-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips-dbgsym", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-modules-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" }, { "binary_name": "linux-tools-5.15.0-1058-azure-fips", "binary_version": "5.15.0-1058.66+fips1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-buildinfo-6.8.0-31-generic-64k", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-cloud-tools-6.8.0-31", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-cloud-tools-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-doc", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-headers-6.8.0-31", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-headers-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-headers-6.8.0-31-generic-64k", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-image-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-image-6.8.0-31-generic-dbgsym", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-image-unsigned-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-image-unsigned-6.8.0-31-generic-64k", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-image-unsigned-6.8.0-31-generic-64k-dbgsym", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-image-unsigned-6.8.0-31-generic-dbgsym", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-lib-rust-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-libc-dev", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-modules-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-modules-6.8.0-31-generic-64k", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-modules-extra-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-modules-ipu6-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-modules-ivsc-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-source-6.8.0", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-tools-6.8.0-31", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-tools-6.8.0-31-generic", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-tools-6.8.0-31-generic-64k", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-tools-common", "binary_version": "6.8.0-31.31" }, { "binary_name": "linux-tools-host", "binary_version": "6.8.0-31.31" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.8.0-1008", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-aws-headers-6.8.0-1008", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-aws-tools-6.8.0-1008", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-buildinfo-6.8.0-1008-aws", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-cloud-tools-6.8.0-1008-aws", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-headers-6.8.0-1008-aws", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-aws", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-aws-dbgsym", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-modules-6.8.0-1008-aws", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-modules-extra-6.8.0-1008-aws", "binary_version": "6.8.0-1008.8" }, { "binary_name": "linux-tools-6.8.0-1008-aws", "binary_version": "6.8.0-1008.8" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.8.0-1007", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-azure-headers-6.8.0-1007", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-azure-tools-6.8.0-1007", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-buildinfo-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-cloud-tools-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-headers-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-azure-dbgsym", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-extra-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-tools-6.8.0-1007-azure", "binary_version": "6.8.0-1007.7" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1007-gcp", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-gcp-headers-6.8.0-1007", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-gcp-tools-6.8.0-1007", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-headers-6.8.0-1007-gcp", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-gcp", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-gcp-dbgsym", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-6.8.0-1007-gcp", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-extra-6.8.0-1007-gcp", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1007-gcp", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-tools-6.8.0-1007-gcp", "binary_version": "6.8.0-1007.7" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-buildinfo-6.8.0-31-lowlatency-64k", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-cloud-tools-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-headers-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-headers-6.8.0-31-lowlatency-64k", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-64k", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-64k-dbgsym", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-dbgsym", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-lowlatency-cloud-tools-6.8.0-31", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-lowlatency-cloud-tools-common", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-lowlatency-headers-6.8.0-31", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-lowlatency-lib-rust-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-lowlatency-tools-6.8.0-31", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-lowlatency-tools-common", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-lowlatency-tools-host", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-modules-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-modules-6.8.0-31-lowlatency-64k", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-tools-6.8.0-31-lowlatency", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-tools-6.8.0-31-lowlatency-64k", "binary_version": "6.8.0-31.31.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1005-oracle", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-buildinfo-6.8.0-1005-oracle-64k", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-headers-6.8.0-1005-oracle", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-headers-6.8.0-1005-oracle-64k", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.8.0-1005-oracle", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-64k", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-64k-dbgsym", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-dbgsym", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-modules-6.8.0-1005-oracle", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-modules-6.8.0-1005-oracle-64k", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-modules-extra-6.8.0-1005-oracle", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-modules-extra-6.8.0-1005-oracle-64k", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1005-oracle", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-oracle-headers-6.8.0-1005", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-oracle-tools-6.8.0-1005", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-tools-6.8.0-1005-oracle", "binary_version": "6.8.0-1005.5" }, { "binary_name": "linux-tools-6.8.0-1005-oracle-64k", "binary_version": "6.8.0-1005.5" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1004-raspi", "binary_version": "6.8.0-1004.4" }, { "binary_name": "linux-headers-6.8.0-1004-raspi", "binary_version": "6.8.0-1004.4" }, { "binary_name": "linux-image-6.8.0-1004-raspi", "binary_version": "6.8.0-1004.4" }, { "binary_name": "linux-image-6.8.0-1004-raspi-dbgsym", "binary_version": "6.8.0-1004.4" }, { "binary_name": "linux-modules-6.8.0-1004-raspi", "binary_version": "6.8.0-1004.4" }, { "binary_name": "linux-raspi-headers-6.8.0-1004", "binary_version": "6.8.0-1004.4" }, { "binary_name": "linux-raspi-tools-6.8.0-1004", "binary_version": "6.8.0-1004.4" }, { "binary_name": "linux-tools-6.8.0-1004-raspi", "binary_version": "6.8.0-1004.4" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-headers-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1001-realtime-dbgsym", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-modules-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-modules-extra-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-realtime-cloud-tools-6.11.0-1001", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-realtime-headers-6.11.0-1001", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-realtime-tools-6.11.0-1001", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-tools-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-31-generic", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-headers-6.8.0-31-generic", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-image-6.8.0-31-generic", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-image-6.8.0-31-generic-dbgsym", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-modules-6.8.0-31-generic", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-riscv-headers-6.8.0-31", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-riscv-tools-6.8.0-31", "binary_version": "6.8.0-31.31.1" }, { "binary_name": "linux-tools-6.8.0-31-generic", "binary_version": "6.8.0-31.31.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-buildinfo-6.5.0-9-generic-64k", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-cloud-tools-6.5.0-9", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-cloud-tools-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-doc", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-headers-6.5.0-9", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-headers-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-headers-6.5.0-9-generic-64k", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-image-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-image-6.5.0-9-generic-dbgsym", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-image-unsigned-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-image-unsigned-6.5.0-9-generic-64k", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-image-unsigned-6.5.0-9-generic-64k-dbgsym", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-image-unsigned-6.5.0-9-generic-dbgsym", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-lib-rust-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-libc-dev", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-modules-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-modules-6.5.0-9-generic-64k", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-modules-extra-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-modules-ipu6-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-modules-ivsc-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-modules-iwlwifi-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-source-6.5.0", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-tools-6.5.0-9", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-tools-6.5.0-9-generic", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-tools-6.5.0-9-generic-64k", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-tools-common", "binary_version": "6.5.0-9.9" }, { "binary_name": "linux-tools-host", "binary_version": "6.5.0-9.9" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.5.0-1008", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-aws-headers-6.5.0-1008", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-aws-tools-6.5.0-1008", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-buildinfo-6.5.0-1008-aws", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-cloud-tools-6.5.0-1008-aws", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-headers-6.5.0-1008-aws", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.5.0-1008-aws", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.5.0-1008-aws-dbgsym", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-modules-6.5.0-1008-aws", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-modules-extra-6.5.0-1008-aws", "binary_version": "6.5.0-1008.8" }, { "binary_name": "linux-tools-6.5.0-1008-aws", "binary_version": "6.5.0-1008.8" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.5.0-1007", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-azure-headers-6.5.0-1007", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-azure-tools-6.5.0-1007", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-buildinfo-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-cloud-tools-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-headers-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.5.0-1007-azure-dbgsym", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-modules-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-modules-extra-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-modules-iwlwifi-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-tools-6.5.0-1007-azure", "binary_version": "6.5.0-1007.7" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1008", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-azure-6.11-headers-6.11.0-1008", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-azure-6.11-tools-6.11.0-1008", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1008-azure-dbgsym", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1008-azure", "binary_version": "6.11.0-1008.8~24.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1013", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-azure-nvidia-cloud-tools-common", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-azure-nvidia-headers-6.8.0-1013", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-azure-nvidia-tools-6.8.0-1013", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-buildinfo-6.8.0-1013-azure-nvidia", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-cloud-tools-6.8.0-1013-azure-nvidia", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-headers-6.8.0-1013-azure-nvidia", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-image-unsigned-6.8.0-1013-azure-nvidia", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-image-unsigned-6.8.0-1013-azure-nvidia-dbgsym", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-modules-6.8.0-1013-azure-nvidia", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-modules-extra-6.8.0-1013-azure-nvidia", "binary_version": "6.8.0-1013.14" }, { "binary_name": "linux-tools-6.8.0-1013-azure-nvidia", "binary_version": "6.8.0-1013.14" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.5.0-1007-gcp", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-gcp-headers-6.5.0-1007", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-gcp-tools-6.5.0-1007", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-headers-6.5.0-1007-gcp", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.5.0-1007-gcp", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.5.0-1007-gcp-dbgsym", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-modules-6.5.0-1007-gcp", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-modules-extra-6.5.0-1007-gcp", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-modules-iwlwifi-6.5.0-1007-gcp", "binary_version": "6.5.0-1007.7" }, { "binary_name": "linux-tools-6.5.0-1007-gcp", "binary_version": "6.5.0-1007.7" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1006-gcp", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-gcp-6.11-headers-6.11.0-1006", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1006-gcp", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-gcp-6.11-tools-6.11.0-1006", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-headers-6.11.0-1006-gcp", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-image-unsigned-6.11.0-1006-gcp", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-image-unsigned-6.11.0-1006-gcp-dbgsym", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-modules-6.11.0-1006-gcp", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-modules-extra-6.11.0-1006-gcp", "binary_version": "6.11.0-1006.6~24.04.2" }, { "binary_name": "linux-tools-6.11.0-1006-gcp", "binary_version": "6.11.0-1006.6~24.04.2" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1003-gke", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-gke-headers-6.8.0-1003", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-gke-tools-6.8.0-1003", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-headers-6.8.0-1003-gke", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-gke", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-gke-dbgsym", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-modules-6.8.0-1003-gke", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-modules-extra-6.8.0-1003-gke", "binary_version": "6.8.0-1003.5" }, { "binary_name": "linux-tools-6.8.0-1003-gke", "binary_version": "6.8.0-1003.5" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1001-gkeop", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-cloud-tools-6.8.0-1001-gkeop", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-gkeop-cloud-tools-6.8.0-1001", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-gkeop-headers-6.8.0-1001", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-gkeop-tools-6.8.0-1001", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-headers-6.8.0-1001-gkeop", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop-dbgsym", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-modules-6.8.0-1001-gkeop", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-modules-extra-6.8.0-1001-gkeop", "binary_version": "6.8.0-1001.3" }, { "binary_name": "linux-tools-6.8.0-1001-gkeop", "binary_version": "6.8.0-1001.3" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-headers-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-headers-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-cloud-tools-6.11.0-19", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-headers-6.11.0-19", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-lib-rust-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-hwe-6.11-tools-6.11.0-19", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-6.11.0-19-generic-dbgsym", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic-64k-dbgsym", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-19-generic-dbgsym", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-ipu6-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-ipu7-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-usbio-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-modules-vision-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-tools-6.11.0-19-generic", "binary_version": "6.11.0-19.19~24.04.1" }, { "binary_name": "linux-tools-6.11.0-19-generic-64k", "binary_version": "6.11.0-19.19~24.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.5.0-1009-ibm", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-headers-6.5.0-1009-ibm", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-ibm-cloud-tools-common", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-ibm-headers-6.5.0-1009", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-ibm-source-6.5.0", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-ibm-tools-6.5.0-1009", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-ibm-tools-common", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-image-unsigned-6.5.0-1009-ibm", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-image-unsigned-6.5.0-1009-ibm-dbgsym", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-modules-6.5.0-1009-ibm", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-modules-extra-6.5.0-1009-ibm", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-modules-iwlwifi-6.5.0-1009-ibm", "binary_version": "6.5.0-1009.9" }, { "binary_name": "linux-tools-6.5.0-1009-ibm", "binary_version": "6.5.0-1009.9" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.5.0-9-lowlatency", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-buildinfo-6.5.0-9-lowlatency-64k", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-cloud-tools-6.5.0-9-lowlatency", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-headers-6.5.0-9-lowlatency", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-headers-6.5.0-9-lowlatency-64k", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency-64k", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency-64k-dbgsym", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency-dbgsym", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-lowlatency-cloud-tools-6.5.0-9", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-lowlatency-cloud-tools-common", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-lowlatency-headers-6.5.0-9", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-lowlatency-tools-6.5.0-9", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-lowlatency-tools-common", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-lowlatency-tools-host", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-modules-6.5.0-9-lowlatency", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-modules-6.5.0-9-lowlatency-64k", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-modules-iwlwifi-6.5.0-9-lowlatency", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-tools-6.5.0-9-lowlatency", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-tools-6.5.0-9-lowlatency-64k", "binary_version": "6.5.0-9.9.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency-64k-dbgsym", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-lowlatency-dbgsym", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1011", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-headers-6.11.0-1011", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.11-tools-6.11.0-1011", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-lowlatency", "binary_version": "6.11.0-1011.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-lowlatency-64k", "binary_version": "6.11.0-1011.12~24.04.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1007-nvidia", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-buildinfo-6.8.0-1007-nvidia-64k", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-headers-6.8.0-1007-nvidia", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-headers-6.8.0-1007-nvidia-64k", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-64k", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-64k-dbgsym", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-dbgsym", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-6.8.0-1007-nvidia", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-6.8.0-1007-nvidia-64k", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-extra-6.8.0-1007-nvidia", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1007-nvidia", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1007-nvidia-64k", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-nvidia-headers-6.8.0-1007", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-nvidia-tools-6.8.0-1007", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-nvidia-tools-host", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-tools-6.8.0-1007-nvidia", "binary_version": "6.8.0-1007.7" }, { "binary_name": "linux-tools-6.8.0-1007-nvidia-64k", "binary_version": "6.8.0-1007.7" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1009-nvidia-lowlatency", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-buildinfo-6.8.0-1009-nvidia-lowlatency-64k", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-headers-6.8.0-1009-nvidia-lowlatency", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-headers-6.8.0-1009-nvidia-lowlatency-64k", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k-dbgsym", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-dbgsym", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-modules-6.8.0-1009-nvidia-lowlatency", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-modules-6.8.0-1009-nvidia-lowlatency-64k", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-modules-extra-6.8.0-1009-nvidia-lowlatency", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency-64k", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1009", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1009", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-nvidia-lowlatency-tools-host", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-tools-6.8.0-1009-nvidia-lowlatency", "binary_version": "6.8.0-1009.9.1" }, { "binary_name": "linux-tools-6.8.0-1009-nvidia-lowlatency-64k", "binary_version": "6.8.0-1009.9.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-buildinfo-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-headers-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-headers-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra-dbgsym", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-nvidia-tegra-rt-dbgsym", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-extra-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-extra-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-nvidia-tegra-headers-6.8.0-1003", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-nvidia-tegra-tools-6.8.0-1003", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-tools-6.8.0-1003-nvidia-tegra", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-tools-6.8.0-1003-nvidia-tegra-rt", "binary_version": "6.8.0-1003.3" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-headers-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-oem-dbgsym", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-ipu6-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-ipu7-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-usbio-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-vision-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-oem-6.11-headers-6.11.0-1007", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-oem-6.11-tools-6.11.0-1007", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-tools-6.11.0-1007-oem", "binary_version": "6.11.0-1007.7" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-headers-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-image-unsigned-6.14.0-1005-oem-dbgsym", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-ipu6-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-ipu7-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-iwlwifi-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-usbio-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-modules-vision-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-oem-6.14-headers-6.14.0-1005", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-oem-6.14-tools-6.14.0-1005", "binary_version": "6.14.0-1005.5" }, { "binary_name": "linux-tools-6.14.0-1005-oem", "binary_version": "6.14.0-1005.5" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-headers-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.8.0-1003-oem-dbgsym", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-ipu6-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-ivsc-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-oem-6.8-headers-6.8.0-1003", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-oem-6.8-tools-6.8.0-1003", "binary_version": "6.8.0-1003.3" }, { "binary_name": "linux-tools-6.8.0-1003-oem", "binary_version": "6.8.0-1003.3" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.5.0-1010-oracle", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-headers-6.5.0-1010-oracle", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-image-unsigned-6.5.0-1010-oracle", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-image-unsigned-6.5.0-1010-oracle-dbgsym", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-modules-6.5.0-1010-oracle", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-modules-extra-6.5.0-1010-oracle", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-modules-iwlwifi-6.5.0-1010-oracle", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-oracle-headers-6.5.0-1010", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-oracle-tools-6.5.0-1010", "binary_version": "6.5.0-1010.10" }, { "binary_name": "linux-tools-6.5.0-1010-oracle", "binary_version": "6.5.0-1010.10" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.5.0-1005-raspi", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-headers-6.5.0-1005-raspi", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-image-6.5.0-1005-raspi", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-image-6.5.0-1005-raspi-dbgsym", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-modules-6.5.0-1005-raspi", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-modules-extra-6.5.0-1005-raspi", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-raspi-headers-6.5.0-1005", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-raspi-tools-6.5.0-1005", "binary_version": "6.5.0-1005.7" }, { "binary_name": "linux-tools-6.5.0-1005-raspi", "binary_version": "6.5.0-1005.7" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.5.0-9-generic", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-headers-6.5.0-9-generic", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-image-6.5.0-9-generic", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-image-6.5.0-9-generic-dbgsym", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-modules-6.5.0-9-generic", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-modules-extra-6.5.0-9-generic", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-riscv-headers-6.5.0-9", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-riscv-tools-6.5.0-9", "binary_version": "6.5.0-9.9.1" }, { "binary_name": "linux-tools-6.5.0-9-generic", "binary_version": "6.5.0-9.9.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.7.0-2001-raspi-realtime", "binary_version": "6.7.0-2001.1" }, { "binary_name": "linux-headers-6.7.0-2001-raspi-realtime", "binary_version": "6.7.0-2001.1" }, { "binary_name": "linux-image-6.7.0-2001-raspi-realtime", "binary_version": "6.7.0-2001.1" }, { "binary_name": "linux-image-6.7.0-2001-raspi-realtime-dbgsym", "binary_version": "6.7.0-2001.1" }, { "binary_name": "linux-modules-6.7.0-2001-raspi-realtime", "binary_version": "6.7.0-2001.1" }, { "binary_name": "linux-raspi-realtime-headers-6.7.0-2001", "binary_version": "6.7.0-2001.1" }, { "binary_name": "linux-raspi-realtime-tools-6.7.0-2001", "binary_version": "6.7.0-2001.1" }, { "binary_name": "linux-tools-6.7.0-2001-raspi-realtime", "binary_version": "6.7.0-2001.1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-cloud-tools-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-headers-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-image-unsigned-6.8.0-1008-realtime-dbgsym", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-modules-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-modules-extra-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-realtime-cloud-tools-6.8.0-1008", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-realtime-headers-6.8.0-1008", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-realtime-tools-6.8.0-1008", "binary_version": "6.8.0-1008.19" }, { "binary_name": "linux-tools-6.8.0-1008-realtime", "binary_version": "6.8.0-1008.19" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-buildinfo-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-buildinfo-6.11.0-8-generic-64k", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-cloud-tools-6.11.0-8", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-cloud-tools-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-doc", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-headers-6.11.0-8", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-headers-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-headers-6.11.0-8-generic-64k", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-image-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-image-6.11.0-8-generic-dbgsym", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-image-unsigned-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-image-unsigned-6.11.0-8-generic-64k", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-image-unsigned-6.11.0-8-generic-64k-dbgsym", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-image-unsigned-6.11.0-8-generic-dbgsym", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-lib-rust-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-libc-dev", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-6.11.0-8-generic-64k", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-extra-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-ipu6-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-ipu7-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-usbio-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-modules-vision-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-source-6.11.0", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-tools-6.11.0-8", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-tools-6.11.0-8-generic", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-tools-6.11.0-8-generic-64k", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-tools-common", "binary_version": "6.11.0-8.8" }, { "binary_name": "linux-tools-host", "binary_version": "6.11.0-8.8" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-aws-headers-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-aws-tools-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-buildinfo-6.11.0-1004-aws", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-cloud-tools-6.11.0-1004-aws", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-headers-6.11.0-1004-aws", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-image-unsigned-6.11.0-1004-aws", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-image-unsigned-6.11.0-1004-aws-dbgsym", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-modules-6.11.0-1004-aws", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-modules-extra-6.11.0-1004-aws", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-tools-6.11.0-1004-aws", "binary_version": "6.11.0-1004.4" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-azure-headers-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-azure-tools-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-buildinfo-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-cloud-tools-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-headers-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-image-unsigned-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-image-unsigned-6.11.0-1004-azure-dbgsym", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-modules-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-modules-extra-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-tools-6.11.0-1004-azure", "binary_version": "6.11.0-1004.4" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1003-gcp", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-gcp-headers-6.11.0-1003", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-gcp-tools-6.11.0-1003", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-headers-6.11.0-1003-gcp", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.11.0-1003-gcp", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-image-unsigned-6.11.0-1003-gcp-dbgsym", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-modules-6.11.0-1003-gcp", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-modules-extra-6.11.0-1003-gcp", "binary_version": "6.11.0-1003.3" }, { "binary_name": "linux-tools-6.11.0-1003-gcp", "binary_version": "6.11.0-1003.3" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1006-oracle", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-buildinfo-6.11.0-1006-oracle-64k", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-headers-6.11.0-1006-oracle", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-headers-6.11.0-1006-oracle-64k", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-image-unsigned-6.11.0-1006-oracle", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-image-unsigned-6.11.0-1006-oracle-64k", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-image-unsigned-6.11.0-1006-oracle-64k-dbgsym", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-image-unsigned-6.11.0-1006-oracle-dbgsym", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-modules-6.11.0-1006-oracle", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-modules-6.11.0-1006-oracle-64k", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-modules-extra-6.11.0-1006-oracle", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-modules-extra-6.11.0-1006-oracle-64k", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-oracle-headers-6.11.0-1006", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-oracle-tools-6.11.0-1006", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-tools-6.11.0-1006-oracle", "binary_version": "6.11.0-1006.6" }, { "binary_name": "linux-tools-6.11.0-1006-oracle-64k", "binary_version": "6.11.0-1006.6" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1004-raspi", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-headers-6.11.0-1004-raspi", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-image-6.11.0-1004-raspi", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-image-6.11.0-1004-raspi-dbgsym", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-modules-6.11.0-1004-raspi", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-raspi-headers-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-raspi-tools-6.11.0-1004", "binary_version": "6.11.0-1004.4" }, { "binary_name": "linux-tools-6.11.0-1004-raspi", "binary_version": "6.11.0-1004.4" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-headers-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1001-realtime-dbgsym", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-modules-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-modules-extra-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-realtime-cloud-tools-6.11.0-1001", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-realtime-headers-6.11.0-1001", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-realtime-tools-6.11.0-1001", "binary_version": "6.11.0-1001.1" }, { "binary_name": "linux-tools-6.11.0-1001-realtime", "binary_version": "6.11.0-1001.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }
{ "priority_reason": "The vulnerability is local and requires both to have elevated privileges (to unmount the smb share) and to win a race condition in order to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-8-generic", "binary_version": "6.11.0-8.8.1" }, { "binary_name": "linux-headers-6.11.0-8-generic", "binary_version": "6.11.0-8.8.1" }, { "binary_name": "linux-image-6.11.0-8-generic", "binary_version": "6.11.0-8.8.1" }, { "binary_name": "linux-image-6.11.0-8-generic-dbgsym", "binary_version": "6.11.0-8.8.1" }, { "binary_name": "linux-modules-6.11.0-8-generic", "binary_version": "6.11.0-8.8.1" }, { "binary_name": "linux-riscv-headers-6.11.0-8", "binary_version": "6.11.0-8.8.1" }, { "binary_name": "linux-riscv-tools-6.11.0-8", "binary_version": "6.11.0-8.8.1" }, { "binary_name": "linux-tools-6.11.0-8-generic", "binary_version": "6.11.0-8.8.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }