A use-after-free vulnerability in the Linux kernel's netfilter: nftables component can be exploited to achieve local privilege escalation. The function nftpipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "dasd-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-snapdragon": "5.4.0-9.12", "kernel-image-5.4.0-9-generic-di": "5.4.0-9.12", "parport-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9-generic-lpae": "5.4.0-9.12", "md-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-lowlatency-dbgsym": "5.4.0-9.12", "storage-core-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9": "5.4.0-9.12", "ppp-modules-5.4.0-9-generic-di": "5.4.0-9.12", "plip-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "block-modules-5.4.0-9-generic-di": "5.4.0-9.12", "usb-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "vlan-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-udebs-generic": "5.4.0-9.12", "plip-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-usb-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-lowlatency": "5.4.0-9.12", "input-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "fs-core-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "ipmi-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "storage-core-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-modules-extra-5.4.0-9-generic": "5.4.0-9.12", "block-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-generic-dbgsym": "5.4.0-9.12", "floppy-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-shared-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "crypto-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "kernel-image-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "nic-pcmcia-modules-5.4.0-9-generic-di": "5.4.0-9.12", "virtio-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic-dbgsym": "5.4.0-9.12", "ipmi-modules-5.4.0-9-generic-di": "5.4.0-9.12", "pcmcia-storage-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-generic": "5.4.0-9.12", "fb-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nfs-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-generic": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-snapdragon-dbgsym": "5.4.0-9.12", "ppp-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-tools-5.4.0-9-generic": "5.4.0-9.12", "input-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-shared-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic-lpae-dbgsym": "5.4.0-9.12", "nfs-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9-generic": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-lowlatency": "5.4.0-9.12", "linux-tools-5.4.0-9": "5.4.0-9.12", "crypto-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-lowlatency": "5.4.0-9.12", "linux-cloud-tools-common": "5.4.0-9.12", "md-modules-5.4.0-9-generic-di": "5.4.0-9.12", "serial-modules-5.4.0-9-generic-di": "5.4.0-9.12", "vlan-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-libc-dev": "5.4.0-9.12", "linux-source-5.4.0": "5.4.0-9.12", "linux-tools-5.4.0-9-lowlatency": "5.4.0-9.12", "nic-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-doc": "5.4.0-9.12", "nic-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "parport-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "fat-modules-5.4.0-9-generic-di": "5.4.0-9.12", "fs-secondary-modules-5.4.0-9-generic-di": "5.4.0-9.12", "message-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-generic-lpae": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-generic": "5.4.0-9.12", "multipath-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "sata-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "pata-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic": "5.4.0-9.12", "linux-tools-5.4.0-9-generic-lpae": "5.4.0-9.12", "linux-cloud-tools-5.4.0-9": "5.4.0-9.12", "mouse-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-tools-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-headers-5.4.0-9-lowlatency": "5.4.0-9.12", "dasd-extra-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-generic-lpae": "5.4.0-9.12", "linux-tools-host": "5.4.0-9.12", "linux-cloud-tools-5.4.0-9-lowlatency": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-udebs-generic-lpae": "5.4.0-9.12", "pcmcia-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-usb-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "multipath-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-cloud-tools-5.4.0-9-generic": "5.4.0-9.12", "sata-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic-lpae": "5.4.0-9.12", "scsi-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-tools-common": "5.4.0-9.12", "mouse-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "fs-secondary-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "scsi-modules-5.4.0-9-generic-di": "5.4.0-9.12", "usb-modules-5.4.0-9-generic-di": "5.4.0-9.12", "fs-core-modules-5.4.0-9-generic-di": "5.4.0-9.12", "firewire-core-modules-5.4.0-9-generic-di": "5.4.0-9.12", "fat-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-aws-cloud-tools-5.4.0-1005": "5.4.0-1005.5", "linux-image-5.4.0-1005-aws-dbgsym": "5.4.0-1005.5", "linux-modules-extra-5.4.0-1005-aws": "5.4.0-1005.5", "linux-headers-5.4.0-1005-aws": "5.4.0-1005.5", "linux-modules-5.4.0-1005-aws": "5.4.0-1005.5", "linux-image-5.4.0-1005-aws": "5.4.0-1005.5", "linux-aws-tools-5.4.0-1005": "5.4.0-1005.5", "linux-tools-5.4.0-1005-aws": "5.4.0-1005.5", "linux-aws-headers-5.4.0-1005": "5.4.0-1005.5", "linux-buildinfo-5.4.0-1005-aws": "5.4.0-1005.5", "linux-cloud-tools-5.4.0-1005-aws": "5.4.0-1005.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-1052-aws": "5.15.0-1052.57~20.04.1", "linux-aws-5.15-cloud-tools-5.15.0-1052": "5.15.0-1052.57~20.04.1", "linux-modules-extra-5.15.0-1052-aws": "5.15.0-1052.57~20.04.1", "linux-cloud-tools-5.15.0-1052-aws": "5.15.0-1052.57~20.04.1", "linux-tools-5.15.0-1052-aws": "5.15.0-1052.57~20.04.1", "linux-aws-5.15-tools-5.15.0-1052": "5.15.0-1052.57~20.04.1", "linux-buildinfo-5.15.0-1052-aws": "5.15.0-1052.57~20.04.1", "linux-image-unsigned-5.15.0-1052-aws": "5.15.0-1052.57~20.04.1", "linux-image-unsigned-5.15.0-1052-aws-dbgsym": "5.15.0-1052.57~20.04.1", "linux-modules-5.15.0-1052-aws": "5.15.0-1052.57~20.04.1", "linux-aws-5.15-headers-5.15.0-1052": "5.15.0-1052.57~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-azure-headers-5.4.0-1006": "5.4.0-1006.6", "linux-image-unsigned-5.4.0-1006-azure-dbgsym": "5.4.0-1006.6", "linux-cloud-tools-5.4.0-1006-azure": "5.4.0-1006.6", "linux-buildinfo-5.4.0-1006-azure": "5.4.0-1006.6", "linux-headers-5.4.0-1006-azure": "5.4.0-1006.6", "linux-azure-cloud-tools-5.4.0-1006": "5.4.0-1006.6", "linux-modules-extra-5.4.0-1006-azure": "5.4.0-1006.6", "linux-image-unsigned-5.4.0-1006-azure": "5.4.0-1006.6", "linux-azure-tools-5.4.0-1006": "5.4.0-1006.6", "linux-tools-5.4.0-1006-azure": "5.4.0-1006.6", "linux-modules-5.4.0-1006-azure": "5.4.0-1006.6" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-1054-azure": "5.15.0-1054.62~20.04.1", "linux-azure-5.15-headers-5.15.0-1054": "5.15.0-1054.62~20.04.1", "linux-azure-5.15-cloud-tools-5.15.0-1054": "5.15.0-1054.62~20.04.1", "linux-buildinfo-5.15.0-1054-azure": "5.15.0-1054.62~20.04.1", "linux-tools-5.15.0-1054-azure": "5.15.0-1054.62~20.04.1", "linux-cloud-tools-5.15.0-1054-azure": "5.15.0-1054.62~20.04.1", "linux-modules-5.15.0-1054-azure": "5.15.0-1054.62~20.04.1", "linux-modules-extra-5.15.0-1054-azure": "5.15.0-1054.62~20.04.1", "linux-azure-5.15-tools-5.15.0-1054": "5.15.0-1054.62~20.04.1", "linux-image-unsigned-5.15.0-1054-azure-dbgsym": "5.15.0-1054.62~20.04.1", "linux-image-unsigned-5.15.0-1054-azure": "5.15.0-1054.62~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1054-azure-fde": "5.15.0-1054.62~20.04.1.1", "linux-image-unsigned-5.15.0-1054-azure-fde-dbgsym": "5.15.0-1054.62~20.04.1.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-modules-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-tools-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-modules-extra-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-gcp-headers-5.4.0-1005": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-gcp-dbgsym": "5.4.0-1005.5", "linux-gcp-tools-5.4.0-1005": "5.4.0-1005.5", "linux-headers-5.4.0-1005-gcp": "5.4.0-1005.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1049-gcp-dbgsym": "5.15.0-1049.57~20.04.1", "linux-image-unsigned-5.15.0-1049-gcp": "5.15.0-1049.57~20.04.1", "linux-buildinfo-5.15.0-1049-gcp": "5.15.0-1049.57~20.04.1", "linux-modules-extra-5.15.0-1049-gcp": "5.15.0-1049.57~20.04.1", "linux-tools-5.15.0-1049-gcp": "5.15.0-1049.57~20.04.1", "linux-gcp-5.15-tools-5.15.0-1049": "5.15.0-1049.57~20.04.1", "linux-headers-5.15.0-1049-gcp": "5.15.0-1049.57~20.04.1", "linux-modules-5.15.0-1049-gcp": "5.15.0-1049.57~20.04.1", "linux-gcp-5.15-headers-5.15.0-1049": "5.15.0-1049.57~20.04.1", "linux-modules-iwlwifi-5.15.0-1049-gcp": "5.15.0-1049.57~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-gkeop-tools-5.4.0-1008": "5.4.0-1008.9", "linux-cloud-tools-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-gkeop-source-5.4.0": "5.4.0-1008.9", "linux-headers-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-image-unsigned-5.4.0-1008-gkeop-dbgsym": "5.4.0-1008.9", "linux-modules-extra-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-image-unsigned-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-gkeop-headers-5.4.0-1008": "5.4.0-1008.9", "linux-gkeop-cloud-tools-5.4.0-1008": "5.4.0-1008.9", "linux-modules-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-tools-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-buildinfo-5.4.0-1008-gkeop": "5.4.0-1008.9" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1035-gkeop-dbgsym": "5.15.0-1035.41~20.04.1", "linux-headers-5.15.0-1035-gkeop": "5.15.0-1035.41~20.04.1", "linux-modules-5.15.0-1035-gkeop": "5.15.0-1035.41~20.04.1", "linux-gkeop-5.15-headers-5.15.0-1035": "5.15.0-1035.41~20.04.1", "linux-gkeop-5.15-tools-5.15.0-1035": "5.15.0-1035.41~20.04.1", "linux-tools-5.15.0-1035-gkeop": "5.15.0-1035.41~20.04.1", "linux-image-unsigned-5.15.0-1035-gkeop": "5.15.0-1035.41~20.04.1", "linux-modules-extra-5.15.0-1035-gkeop": "5.15.0-1035.41~20.04.1", "linux-cloud-tools-5.15.0-1035-gkeop": "5.15.0-1035.41~20.04.1", "linux-buildinfo-5.15.0-1035-gkeop": "5.15.0-1035.41~20.04.1", "linux-gkeop-5.15-cloud-tools-5.15.0-1035": "5.15.0-1035.41~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-hwe-5.15-cloud-tools-common": "5.15.0-92.102~20.04.1", "linux-tools-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-hwe-5.15-headers-5.15.0-92": "5.15.0-92.102~20.04.1", "linux-modules-iwlwifi-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-hwe-5.15-tools-common": "5.15.0-92.102~20.04.1", "linux-headers-5.15.0-92-generic-64k": "5.15.0-92.102~20.04.1", "linux-buildinfo-5.15.0-92-generic-64k": "5.15.0-92.102~20.04.1", "linux-tools-5.15.0-92-generic-64k": "5.15.0-92.102~20.04.1", "linux-hwe-5.15-source-5.15.0": "5.15.0-92.102~20.04.1", "linux-image-5.15.0-92-generic-lpae-dbgsym": "5.15.0-92.102~20.04.1", "linux-hwe-5.15-tools-5.15.0-92": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-generic-64k-dbgsym": "5.15.0-92.102~20.04.1", "linux-headers-5.15.0-92-generic-lpae": "5.15.0-92.102~20.04.1", "linux-image-5.15.0-92-generic-dbgsym": "5.15.0-92.102~20.04.1", "linux-tools-5.15.0-92-generic-lpae": "5.15.0-92.102~20.04.1", "linux-modules-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-image-5.15.0-92-generic-lpae": "5.15.0-92.102~20.04.1", "linux-headers-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-buildinfo-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-cloud-tools-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-generic-dbgsym": "5.15.0-92.102~20.04.1", "linux-hwe-5.15-cloud-tools-5.15.0-92": "5.15.0-92.102~20.04.1", "linux-modules-5.15.0-92-generic-lpae": "5.15.0-92.102~20.04.1", "linux-buildinfo-5.15.0-92-generic-lpae": "5.15.0-92.102~20.04.1", "linux-modules-5.15.0-92-generic-64k": "5.15.0-92.102~20.04.1", "linux-modules-extra-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-image-5.15.0-92-generic": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-generic-64k": "5.15.0-92.102~20.04.1", "linux-hwe-5.15-tools-host": "5.15.0-92.102~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-ibm-cloud-tools-common": "5.4.0-1003.4", "linux-ibm-tools-common": "5.4.0-1003.4", "linux-ibm-headers-5.4.0-1003": "5.4.0-1003.4", "linux-ibm-tools-5.4.0-1003": "5.4.0-1003.4", "linux-image-unsigned-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-tools-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-modules-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-headers-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-ibm-source-5.4.0": "5.4.0-1003.4", "linux-image-unsigned-5.4.0-1003-ibm-dbgsym": "5.4.0-1003.4", "linux-modules-extra-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-buildinfo-5.4.0-1003-ibm": "5.4.0-1003.4" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-1045-ibm": "5.15.0-1045.48~20.04.1", "linux-modules-5.15.0-1045-ibm": "5.15.0-1045.48~20.04.1", "linux-ibm-5.15-tools-5.15.0-1045": "5.15.0-1045.48~20.04.1", "linux-image-unsigned-5.15.0-1045-ibm": "5.15.0-1045.48~20.04.1", "linux-ibm-5.15-source-5.15.0": "5.15.0-1045.48~20.04.1", "linux-buildinfo-5.15.0-1045-ibm": "5.15.0-1045.48~20.04.1", "linux-image-unsigned-5.15.0-1045-ibm-dbgsym": "5.15.0-1045.48~20.04.1", "linux-tools-5.15.0-1045-ibm": "5.15.0-1045.48~20.04.1", "linux-modules-extra-5.15.0-1045-ibm": "5.15.0-1045.48~20.04.1", "linux-ibm-5.15-headers-5.15.0-1045": "5.15.0-1045.48~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-intel-iotg-5.15-headers-5.15.0-1048": "5.15.0-1048.54~20.04.1", "linux-intel-iotg-5.15-tools-common": "5.15.0-1048.54~20.04.1", "linux-modules-iwlwifi-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1", "linux-intel-iotg-5.15-tools-5.15.0-1048": "5.15.0-1048.54~20.04.1", "linux-tools-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1", "linux-modules-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1", "linux-cloud-tools-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1", "linux-intel-iotg-5.15-cloud-tools-5.15.0-1048": "5.15.0-1048.54~20.04.1", "linux-modules-extra-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1", "linux-intel-iotg-5.15-cloud-tools-common": "5.15.0-1048.54~20.04.1", "linux-image-unsigned-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1", "linux-headers-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1", "linux-image-unsigned-5.15.0-1048-intel-iotg-dbgsym": "5.15.0-1048.54~20.04.1", "linux-intel-iotg-5.15-tools-host": "5.15.0-1048.54~20.04.1", "linux-buildinfo-5.15.0-1048-intel-iotg": "5.15.0-1048.54~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.4.0-1001-iot": "5.4.0-1001.3", "linux-iot-tools-5.4.0-1001": "5.4.0-1001.3", "linux-iot-headers-5.4.0-1001": "5.4.0-1001.3", "linux-iot-tools-common": "5.4.0-1001.3", "linux-tools-5.4.0-1001-iot": "5.4.0-1001.3", "linux-buildinfo-5.4.0-1001-iot": "5.4.0-1001.3", "linux-image-unsigned-5.4.0-1001-iot": "5.4.0-1001.3", "linux-headers-5.4.0-1001-iot": "5.4.0-1001.3", "linux-image-unsigned-5.4.0-1001-iot-dbgsym": "5.4.0-1001.3" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-buildinfo-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-headers-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-image-5.4.0-1004-kvm-dbgsym": "5.4.0-1004.4", "linux-kvm-tools-5.4.0-1004": "5.4.0-1004.4", "linux-kvm-headers-5.4.0-1004": "5.4.0-1004.4", "linux-tools-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-modules-5.4.0-1004-kvm": "5.4.0-1004.4" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-92-lowlatency": "5.15.0-92.102~20.04.1", "linux-modules-5.15.0-92-lowlatency-64k": "5.15.0-92.102~20.04.1", "linux-lowlatency-hwe-5.15-headers-5.15.0-92": "5.15.0-92.102~20.04.1", "linux-tools-5.15.0-92-lowlatency": "5.15.0-92.102~20.04.1", "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-92": "5.15.0-92.102~20.04.1", "linux-lowlatency-hwe-5.15-tools-5.15.0-92": "5.15.0-92.102~20.04.1", "linux-modules-5.15.0-92-lowlatency": "5.15.0-92.102~20.04.1", "linux-cloud-tools-5.15.0-92-lowlatency": "5.15.0-92.102~20.04.1", "linux-headers-5.15.0-92-lowlatency-64k": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-lowlatency-64k-dbgsym": "5.15.0-92.102~20.04.1", "linux-lowlatency-hwe-5.15-tools-common": "5.15.0-92.102~20.04.1", "linux-modules-iwlwifi-5.15.0-92-lowlatency": "5.15.0-92.102~20.04.1", "linux-lowlatency-hwe-5.15-tools-host": "5.15.0-92.102~20.04.1", "linux-lowlatency-hwe-5.15-cloud-tools-common": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-lowlatency-dbgsym": "5.15.0-92.102~20.04.1", "linux-buildinfo-5.15.0-92-lowlatency": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-lowlatency-64k": "5.15.0-92.102~20.04.1", "linux-buildinfo-5.15.0-92-lowlatency-64k": "5.15.0-92.102~20.04.1", "linux-tools-5.15.0-92-lowlatency-64k": "5.15.0-92.102~20.04.1", "linux-image-unsigned-5.15.0-92-lowlatency": "5.15.0-92.102~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-headers-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-oracle-dbgsym": "5.4.0-1005.5", "linux-oracle-tools-5.4.0-1005": "5.4.0-1005.5", "linux-modules-extra-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-oracle-headers-5.4.0-1005": "5.4.0-1005.5", "linux-modules-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-tools-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-oracle": "5.4.0-1005.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-oracle-5.15-tools-5.15.0-1050": "5.15.0-1050.56~20.04.1", "linux-oracle-5.15-headers-5.15.0-1050": "5.15.0-1050.56~20.04.1", "linux-image-unsigned-5.15.0-1050-oracle-dbgsym": "5.15.0-1050.56~20.04.1", "linux-modules-5.15.0-1050-oracle": "5.15.0-1050.56~20.04.1", "linux-buildinfo-5.15.0-1050-oracle": "5.15.0-1050.56~20.04.1", "linux-tools-5.15.0-1050-oracle": "5.15.0-1050.56~20.04.1", "linux-modules-extra-5.15.0-1050-oracle": "5.15.0-1050.56~20.04.1", "linux-image-unsigned-5.15.0-1050-oracle": "5.15.0-1050.56~20.04.1", "linux-headers-5.15.0-1050-oracle": "5.15.0-1050.56~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-headers-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-raspi-headers-5.4.0-1007": "5.4.0-1007.7", "linux-tools-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-image-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-modules-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-image-5.4.0-1007-raspi-dbgsym": "5.4.0-1007.7", "linux-raspi-tools-5.4.0-1007": "5.4.0-1007.7" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-extra-5.15.0-1048-generic": "5.15.0-1048.52~20.04.1", "linux-riscv-5.15-tools-5.15.0-1048": "5.15.0-1048.52~20.04.1", "linux-buildinfo-5.15.0-1048-generic": "5.15.0-1048.52~20.04.1", "linux-image-5.15.0-1048-generic-dbgsym": "5.15.0-1048.52~20.04.1", "linux-headers-5.15.0-1048-generic": "5.15.0-1048.52~20.04.1", "linux-modules-5.15.0-1048-generic": "5.15.0-1048.52~20.04.1", "linux-riscv-5.15-headers-5.15.0-1048": "5.15.0-1048.52~20.04.1", "linux-image-5.15.0-1048-generic": "5.15.0-1048.52~20.04.1", "linux-tools-5.15.0-1048-generic": "5.15.0-1048.52~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-image-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-xilinx-zynqmp-headers-5.4.0-1020": "5.4.0-1020.24", "linux-xilinx-zynqmp-tools-5.4.0-1020": "5.4.0-1020.24", "linux-image-5.4.0-1020-xilinx-zynqmp-dbgsym": "5.4.0-1020.24", "linux-tools-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-buildinfo-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-headers-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-tools-5.15.0-92-generic": "5.15.0-92.102", "linux-cloud-tools-common": "5.15.0-92.102", "linux-libc-dev": "5.15.0-92.102", "linux-modules-iwlwifi-5.15.0-92-generic": "5.15.0-92.102", "linux-tools-5.15.0-92": "5.15.0-92.102", "linux-doc": "5.15.0-92.102", "linux-buildinfo-5.15.0-92-generic-64k": "5.15.0-92.102", "linux-headers-5.15.0-92-generic-64k": "5.15.0-92.102", "linux-tools-5.15.0-92-generic-64k": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-generic-64k-dbgsym": "5.15.0-92.102", "linux-image-5.15.0-92-generic-lpae-dbgsym": "5.15.0-92.102", "linux-source-5.15.0": "5.15.0-92.102", "linux-headers-5.15.0-92-generic-lpae": "5.15.0-92.102", "linux-image-5.15.0-92-generic-dbgsym": "5.15.0-92.102", "linux-tools-5.15.0-92-generic-lpae": "5.15.0-92.102", "linux-modules-5.15.0-92-generic": "5.15.0-92.102", "linux-image-5.15.0-92-generic-lpae": "5.15.0-92.102", "linux-headers-5.15.0-92-generic": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-generic": "5.15.0-92.102", "linux-buildinfo-5.15.0-92-generic": "5.15.0-92.102", "linux-cloud-tools-5.15.0-92-generic": "5.15.0-92.102", "linux-tools-host": "5.15.0-92.102", "linux-headers-5.15.0-92": "5.15.0-92.102", "linux-cloud-tools-5.15.0-92": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-generic-dbgsym": "5.15.0-92.102", "linux-modules-5.15.0-92-generic-lpae": "5.15.0-92.102", "linux-buildinfo-5.15.0-92-generic-lpae": "5.15.0-92.102", "linux-tools-common": "5.15.0-92.102", "linux-modules-5.15.0-92-generic-64k": "5.15.0-92.102", "linux-modules-extra-5.15.0-92-generic": "5.15.0-92.102", "linux-image-5.15.0-92-generic": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-generic-64k": "5.15.0-92.102" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-1052-aws": "5.15.0-1052.57", "linux-aws-cloud-tools-5.15.0-1052": "5.15.0-1052.57", "linux-aws-tools-5.15.0-1052": "5.15.0-1052.57", "linux-cloud-tools-5.15.0-1052-aws": "5.15.0-1052.57", "linux-tools-5.15.0-1052-aws": "5.15.0-1052.57", "linux-modules-extra-5.15.0-1052-aws": "5.15.0-1052.57", "linux-buildinfo-5.15.0-1052-aws": "5.15.0-1052.57", "linux-image-unsigned-5.15.0-1052-aws": "5.15.0-1052.57", "linux-aws-headers-5.15.0-1052": "5.15.0-1052.57", "linux-image-unsigned-5.15.0-1052-aws-dbgsym": "5.15.0-1052.57", "linux-modules-5.15.0-1052-aws": "5.15.0-1052.57" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-6.2.0-1018-aws": "6.2.0-1018.18~22.04.1", "linux-aws-6.2-cloud-tools-6.2.0-1018": "6.2.0-1018.18~22.04.1", "linux-aws-6.2-tools-6.2.0-1018": "6.2.0-1018.18~22.04.1", "linux-image-unsigned-6.2.0-1018-aws": "6.2.0-1018.18~22.04.1", "linux-image-unsigned-6.2.0-1018-aws-dbgsym": "6.2.0-1018.18~22.04.1", "linux-buildinfo-6.2.0-1018-aws": "6.2.0-1018.18~22.04.1", "linux-modules-extra-6.2.0-1018-aws": "6.2.0-1018.18~22.04.1", "linux-cloud-tools-6.2.0-1018-aws": "6.2.0-1018.18~22.04.1", "linux-headers-6.2.0-1018-aws": "6.2.0-1018.18~22.04.1", "linux-tools-6.2.0-1018-aws": "6.2.0-1018.18~22.04.1", "linux-aws-6.2-headers-6.2.0-1018": "6.2.0-1018.18~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-1012-aws": "6.5.0-1012.12~22.04.1", "linux-image-unsigned-6.5.0-1012-aws": "6.5.0-1012.12~22.04.1", "linux-cloud-tools-6.5.0-1012-aws": "6.5.0-1012.12~22.04.1", "linux-aws-6.5-tools-6.5.0-1012": "6.5.0-1012.12~22.04.1", "linux-modules-6.5.0-1012-aws": "6.5.0-1012.12~22.04.1", "linux-modules-extra-6.5.0-1012-aws": "6.5.0-1012.12~22.04.1", "linux-image-unsigned-6.5.0-1012-aws-dbgsym": "6.5.0-1012.12~22.04.1", "linux-tools-6.5.0-1012-aws": "6.5.0-1012.12~22.04.1", "linux-aws-6.5-cloud-tools-6.5.0-1012": "6.5.0-1012.12~22.04.1", "linux-aws-6.5-headers-6.5.0-1012": "6.5.0-1012.12~22.04.1", "linux-headers-6.5.0-1012-aws": "6.5.0-1012.12~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-1054-azure": "5.15.0-1054.62", "linux-azure-headers-5.15.0-1054": "5.15.0-1054.62", "linux-azure-tools-5.15.0-1054": "5.15.0-1054.62", "linux-cloud-tools-5.15.0-1054-azure": "5.15.0-1054.62", "linux-buildinfo-5.15.0-1054-azure": "5.15.0-1054.62", "linux-tools-5.15.0-1054-azure": "5.15.0-1054.62", "linux-modules-5.15.0-1054-azure": "5.15.0-1054.62", "linux-azure-cloud-tools-5.15.0-1054": "5.15.0-1054.62", "linux-modules-extra-5.15.0-1054-azure": "5.15.0-1054.62", "linux-image-unsigned-5.15.0-1054-azure-dbgsym": "5.15.0-1054.62", "linux-image-unsigned-5.15.0-1054-azure": "5.15.0-1054.62" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.2.0-1019-azure": "6.2.0-1019.19~22.04.1", "linux-azure-6.2-cloud-tools-6.2.0-1019": "6.2.0-1019.19~22.04.1", "linux-azure-6.2-headers-6.2.0-1019": "6.2.0-1019.19~22.04.1", "linux-headers-6.2.0-1019-azure": "6.2.0-1019.19~22.04.1", "linux-cloud-tools-6.2.0-1019-azure": "6.2.0-1019.19~22.04.1", "linux-modules-6.2.0-1019-azure": "6.2.0-1019.19~22.04.1", "linux-modules-extra-6.2.0-1019-azure": "6.2.0-1019.19~22.04.1", "linux-tools-6.2.0-1019-azure": "6.2.0-1019.19~22.04.1", "linux-azure-6.2-tools-6.2.0-1019": "6.2.0-1019.19~22.04.1", "linux-buildinfo-6.2.0-1019-azure": "6.2.0-1019.19~22.04.1", "linux-image-unsigned-6.2.0-1019-azure-dbgsym": "6.2.0-1019.19~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1", "linux-cloud-tools-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1", "linux-headers-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1", "linux-modules-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1", "linux-image-unsigned-6.5.0-1011-azure-dbgsym": "6.5.0-1011.11~22.04.1", "linux-azure-6.5-headers-6.5.0-1011": "6.5.0-1011.11~22.04.1", "linux-buildinfo-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1", "linux-azure-6.5-cloud-tools-6.5.0-1011": "6.5.0-1011.11~22.04.1", "linux-modules-extra-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1", "linux-modules-iwlwifi-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1", "linux-azure-6.5-tools-6.5.0-1011": "6.5.0-1011.11~22.04.1", "linux-tools-6.5.0-1011-azure": "6.5.0-1011.11~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1054-azure-fde": "5.15.0-1054.62.1", "linux-image-unsigned-5.15.0-1054-azure-fde-dbgsym": "5.15.0-1054.62.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.2.0-1019-azure-fde": "6.2.0-1019.19~22.04.1.1", "linux-image-unsigned-6.2.0-1019-azure-fde-dbgsym": "6.2.0-1019.19~22.04.1.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1049-gcp": "5.15.0-1049.57", "linux-buildinfo-5.15.0-1049-gcp": "5.15.0-1049.57", "linux-modules-extra-5.15.0-1049-gcp": "5.15.0-1049.57", "linux-tools-5.15.0-1049-gcp": "5.15.0-1049.57", "linux-gcp-tools-5.15.0-1049": "5.15.0-1049.57", "linux-gcp-headers-5.15.0-1049": "5.15.0-1049.57", "linux-headers-5.15.0-1049-gcp": "5.15.0-1049.57", "linux-modules-5.15.0-1049-gcp": "5.15.0-1049.57", "linux-image-unsigned-5.15.0-1049-gcp-dbgsym": "5.15.0-1049.57" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.2.0-1021-gcp": "6.2.0-1021.23~22.04.1", "linux-image-unsigned-6.2.0-1021-gcp-dbgsym": "6.2.0-1021.23~22.04.1", "linux-tools-6.2.0-1021-gcp": "6.2.0-1021.23~22.04.1", "linux-headers-6.2.0-1021-gcp": "6.2.0-1021.23~22.04.1", "linux-gcp-6.2-tools-6.2.0-1021": "6.2.0-1021.23~22.04.1", "linux-modules-extra-6.2.0-1021-gcp": "6.2.0-1021.23~22.04.1", "linux-modules-6.2.0-1021-gcp": "6.2.0-1021.23~22.04.1", "linux-buildinfo-6.2.0-1021-gcp": "6.2.0-1021.23~22.04.1", "linux-gcp-6.2-headers-6.2.0-1021": "6.2.0-1021.23~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-6.5.0-1011-gcp": "6.5.0-1011.11~22.04.1", "linux-image-unsigned-6.5.0-1011-gcp-dbgsym": "6.5.0-1011.11~22.04.1", "linux-modules-6.5.0-1011-gcp": "6.5.0-1011.11~22.04.1", "linux-gcp-6.5-tools-6.5.0-1011": "6.5.0-1011.11~22.04.1", "linux-modules-extra-6.5.0-1011-gcp": "6.5.0-1011.11~22.04.1", "linux-buildinfo-6.5.0-1011-gcp": "6.5.0-1011.11~22.04.1", "linux-tools-6.5.0-1011-gcp": "6.5.0-1011.11~22.04.1", "linux-gcp-6.5-headers-6.5.0-1011": "6.5.0-1011.11~22.04.1", "linux-image-unsigned-6.5.0-1011-gcp": "6.5.0-1011.11~22.04.1", "linux-modules-iwlwifi-6.5.0-1011-gcp": "6.5.0-1011.11~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.15.0-1049-gke": "5.15.0-1049.54", "linux-tools-5.15.0-1049-gke": "5.15.0-1049.54", "linux-gke-headers-5.15.0-1049": "5.15.0-1049.54", "linux-headers-5.15.0-1049-gke": "5.15.0-1049.54", "linux-image-unsigned-5.15.0-1049-gke-dbgsym": "5.15.0-1049.54", "linux-gke-tools-5.15.0-1049": "5.15.0-1049.54", "linux-image-unsigned-5.15.0-1049-gke": "5.15.0-1049.54", "linux-modules-5.15.0-1049-gke": "5.15.0-1049.54", "linux-modules-extra-5.15.0-1049-gke": "5.15.0-1049.54", "linux-modules-iwlwifi-5.15.0-1049-gke": "5.15.0-1049.54" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1035-gkeop-dbgsym": "5.15.0-1035.41", "linux-gkeop-headers-5.15.0-1035": "5.15.0-1035.41", "linux-modules-5.15.0-1035-gkeop": "5.15.0-1035.41", "linux-headers-5.15.0-1035-gkeop": "5.15.0-1035.41", "linux-tools-5.15.0-1035-gkeop": "5.15.0-1035.41", "linux-image-unsigned-5.15.0-1035-gkeop": "5.15.0-1035.41", "linux-modules-extra-5.15.0-1035-gkeop": "5.15.0-1035.41", "linux-cloud-tools-5.15.0-1035-gkeop": "5.15.0-1035.41", "linux-buildinfo-5.15.0-1035-gkeop": "5.15.0-1035.41", "linux-gkeop-tools-5.15.0-1035": "5.15.0-1035.41", "linux-gkeop-cloud-tools-5.15.0-1035": "5.15.0-1035.41" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-hwe-6.5-tools-6.5.0-15": "6.5.0-15.15~22.04.1", "linux-hwe-6.5-cloud-tools-6.5.0-15": "6.5.0-15.15~22.04.1", "linux-modules-extra-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-headers-6.5.0-15-generic-64k": "6.5.0-15.15~22.04.1", "linux-image-unsigned-6.5.0-15-generic-dbgsym": "6.5.0-15.15~22.04.1", "linux-modules-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-hwe-6.5-tools-host": "6.5.0-15.15~22.04.1", "linux-headers-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-image-6.5.0-15-generic-dbgsym": "6.5.0-15.15~22.04.1", "linux-hwe-6.5-headers-6.5.0-15": "6.5.0-15.15~22.04.1", "linux-source-6.5.0": "6.5.0-15.15~22.04.1", "linux-modules-iwlwifi-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-hwe-6.5-tools-common": "6.5.0-15.15~22.04.1", "linux-hwe-6.5-cloud-tools-common": "6.5.0-15.15~22.04.1", "linux-buildinfo-6.5.0-15-generic-64k": "6.5.0-15.15~22.04.1", "linux-modules-6.5.0-15-generic-64k": "6.5.0-15.15~22.04.1", "linux-image-unsigned-6.5.0-15-generic-64k": "6.5.0-15.15~22.04.1", "linux-cloud-tools-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-image-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-buildinfo-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-modules-ipu6-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-tools-6.5.0-15-generic-64k": "6.5.0-15.15~22.04.1", "linux-image-unsigned-6.5.0-15-generic-64k-dbgsym": "6.5.0-15.15~22.04.1", "linux-tools-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-modules-ivsc-6.5.0-15-generic": "6.5.0-15.15~22.04.1", "linux-image-unsigned-6.5.0-15-generic": "6.5.0-15.15~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.8.0-38-generic-64k-dbgsym": "6.8.0-38.38~22.04.1", "linux-buildinfo-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-modules-iwlwifi-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-image-6.8.0-38-generic-dbgsym": "6.8.0-38.38~22.04.1", "linux-cloud-tools-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-modules-ipu6-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-headers-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-tools-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-headers-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-hwe-6.8-cloud-tools-6.8.0-38": "6.8.0-38.38~22.04.1", "linux-modules-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-modules-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-modules-usbio-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-hwe-6.8-tools-6.8.0-38": "6.8.0-38.38~22.04.1", "linux-image-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-hwe-6.8-headers-6.8.0-38": "6.8.0-38.38~22.04.1", "linux-image-unsigned-6.8.0-38-generic-dbgsym": "6.8.0-38.38~22.04.1", "linux-buildinfo-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-image-unsigned-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-modules-extra-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-image-unsigned-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-tools-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-ibm-tools-5.15.0-1045": "5.15.0-1045.48", "linux-headers-5.15.0-1045-ibm": "5.15.0-1045.48", "linux-modules-5.15.0-1045-ibm": "5.15.0-1045.48", "linux-ibm-source-5.15.0": "5.15.0-1045.48", "linux-image-unsigned-5.15.0-1045-ibm": "5.15.0-1045.48", "linux-image-unsigned-5.15.0-1045-ibm-dbgsym": "5.15.0-1045.48", "linux-buildinfo-5.15.0-1045-ibm": "5.15.0-1045.48", "linux-tools-5.15.0-1045-ibm": "5.15.0-1045.48", "linux-modules-extra-5.15.0-1045-ibm": "5.15.0-1045.48", "linux-ibm-tools-common": "5.15.0-1045.48", "linux-ibm-headers-5.15.0-1045": "5.15.0-1045.48", "linux-ibm-cloud-tools-common": "5.15.0-1045.48" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.15.0-1047-intel-iotg": "5.15.0-1047.53", "linux-intel-iotg-cloud-tools-5.15.0-1047": "5.15.0-1047.53", "linux-modules-iwlwifi-5.15.0-1047-intel-iotg": "5.15.0-1047.53", "linux-intel-iotg-tools-host": "5.15.0-1047.53", "linux-buildinfo-5.15.0-1047-intel-iotg": "5.15.0-1047.53", "linux-modules-extra-5.15.0-1047-intel-iotg": "5.15.0-1047.53", "linux-image-unsigned-5.15.0-1047-intel-iotg": "5.15.0-1047.53", "linux-intel-iotg-cloud-tools-common": "5.15.0-1047.53", "linux-intel-iotg-headers-5.15.0-1047": "5.15.0-1047.53", "linux-tools-5.15.0-1047-intel-iotg": "5.15.0-1047.53", "linux-intel-iotg-tools-common": "5.15.0-1047.53", "linux-image-unsigned-5.15.0-1047-intel-iotg-dbgsym": "5.15.0-1047.53", "linux-intel-iotg-tools-5.15.0-1047": "5.15.0-1047.53", "linux-cloud-tools-5.15.0-1047-intel-iotg": "5.15.0-1047.53", "linux-headers-5.15.0-1047-intel-iotg": "5.15.0-1047.53" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1049-kvm-dbgsym": "5.15.0-1049.54", "linux-image-unsigned-5.15.0-1049-kvm": "5.15.0-1049.54", "linux-buildinfo-5.15.0-1049-kvm": "5.15.0-1049.54", "linux-headers-5.15.0-1049-kvm": "5.15.0-1049.54", "linux-tools-5.15.0-1049-kvm": "5.15.0-1049.54", "linux-kvm-headers-5.15.0-1049": "5.15.0-1049.54", "linux-modules-5.15.0-1049-kvm": "5.15.0-1049.54", "linux-kvm-tools-5.15.0-1049": "5.15.0-1049.54" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-lowlatency-cloud-tools-5.15.0-92": "5.15.0-92.102", "linux-headers-5.15.0-92-lowlatency": "5.15.0-92.102", "linux-modules-5.15.0-92-lowlatency-64k": "5.15.0-92.102", "linux-tools-5.15.0-92-lowlatency": "5.15.0-92.102", "linux-lowlatency-headers-5.15.0-92": "5.15.0-92.102", "linux-lowlatency-tools-common": "5.15.0-92.102", "linux-lowlatency-tools-host": "5.15.0-92.102", "linux-lowlatency-cloud-tools-common": "5.15.0-92.102", "linux-modules-5.15.0-92-lowlatency": "5.15.0-92.102", "linux-cloud-tools-5.15.0-92-lowlatency": "5.15.0-92.102", "linux-headers-5.15.0-92-lowlatency-64k": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-lowlatency-64k-dbgsym": "5.15.0-92.102", "linux-modules-iwlwifi-5.15.0-92-lowlatency": "5.15.0-92.102", "linux-lowlatency-tools-5.15.0-92": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-lowlatency-dbgsym": "5.15.0-92.102", "linux-buildinfo-5.15.0-92-lowlatency": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-lowlatency-64k": "5.15.0-92.102", "linux-buildinfo-5.15.0-92-lowlatency-64k": "5.15.0-92.102", "linux-tools-5.15.0-92-lowlatency-64k": "5.15.0-92.102", "linux-image-unsigned-5.15.0-92-lowlatency": "5.15.0-92.102" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-lowlatency-hwe-6.5-cloud-tools-common": "6.5.0-15.15.1.1~22.04.1", "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1", "linux-image-unsigned-6.5.0-15-lowlatency-dbgsym": "6.5.0-15.15.1.1~22.04.1", "linux-lowlatency-hwe-6.5-headers-6.5.0-15": "6.5.0-15.15.1.1~22.04.1", "linux-image-unsigned-6.5.0-15-lowlatency-64k-dbgsym": "6.5.0-15.15.1.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-host": "6.5.0-15.15.1.1~22.04.1", "linux-tools-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1", "linux-modules-6.5.0-15-lowlatency-64k": "6.5.0-15.15.1.1~22.04.1", "linux-cloud-tools-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1", "linux-headers-6.5.0-15-lowlatency-64k": "6.5.0-15.15.1.1~22.04.1", "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-15": "6.5.0-15.15.1.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-6.5.0-15": "6.5.0-15.15.1.1~22.04.1", "linux-tools-6.5.0-15-lowlatency-64k": "6.5.0-15.15.1.1~22.04.1", "linux-modules-iwlwifi-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1", "linux-image-unsigned-6.5.0-15-lowlatency-64k": "6.5.0-15.15.1.1~22.04.1", "linux-headers-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1", "linux-buildinfo-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1", "linux-buildinfo-6.5.0-15-lowlatency-64k": "6.5.0-15.15.1.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-common": "6.5.0-15.15.1.1~22.04.1", "linux-image-unsigned-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1", "linux-modules-6.5.0-15-lowlatency": "6.5.0-15.15.1.1~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-38": "6.8.0-38.38.1~22.04.2", "linux-buildinfo-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-modules-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency-dbgsym": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-headers-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-cloud-tools-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-tools-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-tools-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-modules-iwlwifi-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-buildinfo-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-headers-6.8.0-38": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency-64k-dbgsym": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-tools-6.8.0-38": "6.8.0-38.38.1~22.04.2", "linux-headers-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-cloud-tools-5.15.0-1043-nvidia-lowlatency": "5.15.0-1043.43", "linux-image-unsigned-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-tools-5.15.0-1043-nvidia-lowlatency": "5.15.0-1043.43", "linux-image-unsigned-5.15.0-1043-nvidia-lowlatency": "5.15.0-1043.43", "linux-nvidia-cloud-tools-common": "5.15.0-1043.43", "linux-nvidia-tools-common": "5.15.0-1043.43", "linux-modules-nvidia-fs-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-headers-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-headers-5.15.0-1043-nvidia-lowlatency": "5.15.0-1043.43", "linux-image-unsigned-5.15.0-1043-nvidia-lowlatency-dbgsym": "5.15.0-1043.43", "linux-modules-extra-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-cloud-tools-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-buildinfo-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-modules-5.15.0-1043-nvidia-lowlatency": "5.15.0-1043.43", "linux-modules-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-buildinfo-5.15.0-1043-nvidia-lowlatency": "5.15.0-1043.43", "linux-tools-5.15.0-1043-nvidia": "5.15.0-1043.43", "linux-nvidia-headers-5.15.0-1043": "5.15.0-1043.43", "linux-nvidia-cloud-tools-5.15.0-1043": "5.15.0-1043.43", "linux-nvidia-tools-5.15.0-1043": "5.15.0-1043.43", "linux-image-unsigned-5.15.0-1043-nvidia-dbgsym": "5.15.0-1043.43", "linux-modules-nvidia-fs-5.15.0-1043-nvidia-lowlatency": "5.15.0-1043.43", "linux-nvidia-tools-host": "5.15.0-1043.43" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-6.2.0-1015-nvidia": "6.2.0-1015.15", "linux-headers-6.2.0-1015-nvidia-64k": "6.2.0-1015.15", "linux-modules-nvidia-fs-6.2.0-1015-nvidia-64k": "6.2.0-1015.15", "linux-modules-nvidia-fs-6.2.0-1015-nvidia": "6.2.0-1015.15", "linux-nvidia-6.2-headers-6.2.0-1015": "6.2.0-1015.15", "linux-image-unsigned-6.2.0-1015-nvidia-64k-dbgsym": "6.2.0-1015.15", "linux-image-unsigned-6.2.0-1015-nvidia-64k": "6.2.0-1015.15", "linux-buildinfo-6.2.0-1015-nvidia": "6.2.0-1015.15", "linux-modules-6.2.0-1015-nvidia-64k": "6.2.0-1015.15", "linux-image-unsigned-6.2.0-1015-nvidia-dbgsym": "6.2.0-1015.15", "linux-nvidia-6.2-tools-6.2.0-1015": "6.2.0-1015.15", "linux-nvidia-6.2-tools-host": "6.2.0-1015.15", "linux-tools-6.2.0-1015-nvidia-64k": "6.2.0-1015.15", "linux-image-unsigned-6.2.0-1015-nvidia": "6.2.0-1015.15", "linux-tools-6.2.0-1015-nvidia": "6.2.0-1015.15", "linux-buildinfo-6.2.0-1015-nvidia-64k": "6.2.0-1015.15", "linux-modules-extra-6.2.0-1015-nvidia": "6.2.0-1015.15", "linux-modules-6.2.0-1015-nvidia": "6.2.0-1015.15" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.5.0-1014-nvidia": "6.5.0-1014.14", "linux-image-unsigned-6.5.0-1014-nvidia-64k-dbgsym": "6.5.0-1014.14", "linux-modules-6.5.0-1014-nvidia-64k": "6.5.0-1014.14", "linux-modules-extra-6.5.0-1014-nvidia": "6.5.0-1014.14", "linux-modules-6.5.0-1014-nvidia": "6.5.0-1014.14", "linux-headers-6.5.0-1014-nvidia-64k": "6.5.0-1014.14", "linux-tools-6.5.0-1014-nvidia-64k": "6.5.0-1014.14", "linux-modules-nvidia-fs-6.5.0-1014-nvidia": "6.5.0-1014.14", "linux-tools-6.5.0-1014-nvidia": "6.5.0-1014.14", "linux-nvidia-6.5-tools-host": "6.5.0-1014.14", "linux-headers-6.5.0-1014-nvidia": "6.5.0-1014.14", "linux-image-unsigned-6.5.0-1014-nvidia-dbgsym": "6.5.0-1014.14", "linux-buildinfo-6.5.0-1014-nvidia": "6.5.0-1014.14", "linux-image-unsigned-6.5.0-1014-nvidia-64k": "6.5.0-1014.14", "linux-nvidia-6.5-headers-6.5.0-1014": "6.5.0-1014.14", "linux-modules-nvidia-fs-6.5.0-1014-nvidia-64k": "6.5.0-1014.14", "linux-buildinfo-6.5.0-1014-nvidia-64k": "6.5.0-1014.14", "linux-nvidia-6.5-tools-6.5.0-1014": "6.5.0-1014.14" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-tools-6.8.0-1008": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-buildinfo-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-extra-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-modules-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-headers-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-headers-6.8.0-1008": "6.8.0-1008.8~22.04.1", "linux-headers-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-nvidia-fs-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-tools-host": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-dbgsym": "6.8.0-1008.8~22.04.1", "linux-tools-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-tools-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-buildinfo-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-64k-dbgsym": "6.8.0-1008.8~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.1.0-1029-oem": "6.1.0-1029.29", "linux-modules-iwlwifi-6.1.0-1029-oem": "6.1.0-1029.29", "linux-headers-6.1.0-1029-oem": "6.1.0-1029.29", "linux-image-unsigned-6.1.0-1029-oem-dbgsym": "6.1.0-1029.29", "linux-modules-6.1.0-1029-oem": "6.1.0-1029.29", "linux-oem-6.1-headers-6.1.0-1029": "6.1.0-1029.29", "linux-image-unsigned-6.1.0-1029-oem": "6.1.0-1029.29", "linux-oem-6.1-tools-6.1.0-1029": "6.1.0-1029.29", "linux-tools-6.1.0-1029-oem": "6.1.0-1029.29", "linux-oem-6.1-tools-host": "6.1.0-1029.29", "linux-modules-ivsc-6.1.0-1029-oem": "6.1.0-1029.29", "linux-modules-ipu6-6.1.0-1029-oem": "6.1.0-1029.29" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-iwlwifi-6.5.0-1013-oem": "6.5.0-1013.14", "linux-modules-usbio-6.5.0-1013-oem": "6.5.0-1013.14", "linux-modules-ipu6-6.5.0-1013-oem": "6.5.0-1013.14", "linux-tools-6.5.0-1013-oem": "6.5.0-1013.14", "linux-modules-ivsc-6.5.0-1013-oem": "6.5.0-1013.14", "linux-modules-6.5.0-1013-oem": "6.5.0-1013.14", "linux-oem-6.5-tools-6.5.0-1013": "6.5.0-1013.14", "linux-image-unsigned-6.5.0-1013-oem": "6.5.0-1013.14", "linux-oem-6.5-headers-6.5.0-1013": "6.5.0-1013.14", "linux-buildinfo-6.5.0-1013-oem": "6.5.0-1013.14", "linux-oem-6.5-tools-host": "6.5.0-1013.14", "linux-image-unsigned-6.5.0-1013-oem-dbgsym": "6.5.0-1013.14", "linux-oem-6.5-lib-rust-6.5.0-1013-oem": "6.5.0-1013.14", "linux-headers-6.5.0-1013-oem": "6.5.0-1013.14" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1050-oracle-dbgsym": "5.15.0-1050.56", "linux-modules-5.15.0-1050-oracle": "5.15.0-1050.56", "linux-buildinfo-5.15.0-1050-oracle": "5.15.0-1050.56", "linux-tools-5.15.0-1050-oracle": "5.15.0-1050.56", "linux-oracle-tools-5.15.0-1050": "5.15.0-1050.56", "linux-modules-extra-5.15.0-1050-oracle": "5.15.0-1050.56", "linux-oracle-headers-5.15.0-1050": "5.15.0-1050.56", "linux-image-unsigned-5.15.0-1050-oracle": "5.15.0-1050.56", "linux-headers-5.15.0-1050-oracle": "5.15.0-1050.56" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-6.5.0-1014-oracle": "6.5.0-1014.14~22.04.1", "linux-oracle-6.5-tools-6.5.0-1014": "6.5.0-1014.14~22.04.1", "linux-tools-6.5.0-1014-oracle": "6.5.0-1014.14~22.04.1", "linux-image-unsigned-6.5.0-1014-oracle-dbgsym": "6.5.0-1014.14~22.04.1", "linux-modules-extra-6.5.0-1014-oracle": "6.5.0-1014.14~22.04.1", "linux-oracle-6.5-headers-6.5.0-1014": "6.5.0-1014.14~22.04.1", "linux-image-unsigned-6.5.0-1014-oracle": "6.5.0-1014.14~22.04.1", "linux-headers-6.5.0-1014-oracle": "6.5.0-1014.14~22.04.1", "linux-buildinfo-6.5.0-1014-oracle": "6.5.0-1014.14~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.15.0-1045-raspi": "5.15.0-1045.48", "linux-tools-5.15.0-1045-raspi": "5.15.0-1045.48", "linux-image-5.15.0-1045-raspi-dbgsym": "5.15.0-1045.48", "linux-raspi-tools-5.15.0-1045": "5.15.0-1045.48", "linux-buildinfo-5.15.0-1045-raspi": "5.15.0-1045.48", "linux-headers-5.15.0-1045-raspi": "5.15.0-1045.48", "linux-modules-extra-5.15.0-1045-raspi": "5.15.0-1045.48", "linux-raspi-headers-5.15.0-1045": "5.15.0-1045.48", "linux-image-5.15.0-1045-raspi": "5.15.0-1045.48" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-headers-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-modules-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-modules-extra-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-image-6.5.0-17-generic-dbgsym": "6.5.0-17.17.1.1~22.04.1", "linux-image-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-riscv-6.5-headers-6.5.0-17": "6.5.0-17.17.1.1~22.04.1", "linux-riscv-6.5-tools-6.5.0-17": "6.5.0-17.17.1.1~22.04.1", "linux-tools-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-modules-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-riscv-6.8-tools-6.8.0-38": "6.8.0-38.38.1~22.04.1", "linux-image-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-riscv-6.8-headers-6.8.0-38": "6.8.0-38.38.1~22.04.1", "linux-image-6.8.0-38-generic-dbgsym": "6.8.0-38.38.1~22.04.1", "linux-buildinfo-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-tools-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-image-6.5.0-1007-starfive-dbgsym": "6.5.0-1007.8~22.04.1", "linux-tools-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-starfive-6.5-headers-6.5.0-1007": "6.5.0-1007.8~22.04.1", "linux-headers-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-starfive-6.5-tools-6.5.0-1007": "6.5.0-1007.8~22.04.1", "linux-image-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-modules-extra-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-modules-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-tools-5.15.0-1027-xilinx-zynqmp": "5.15.0-1027.31", "linux-image-5.15.0-1027-xilinx-zynqmp": "5.15.0-1027.31", "linux-xilinx-zynqmp-tools-host": "5.15.0-1027.31", "linux-buildinfo-5.15.0-1027-xilinx-zynqmp": "5.15.0-1027.31", "linux-xilinx-zynqmp-headers-5.15.0-1027": "5.15.0-1027.31", "linux-headers-5.15.0-1027-xilinx-zynqmp": "5.15.0-1027.31", "linux-xilinx-zynqmp-tools-5.15.0-1027": "5.15.0-1027.31", "linux-modules-5.15.0-1027-xilinx-zynqmp": "5.15.0-1027.31", "linux-xilinx-zynqmp-tools-common": "5.15.0-1027.31", "linux-image-5.15.0-1027-xilinx-zynqmp-dbgsym": "5.15.0-1027.31" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-6.8.0-11-generic": "6.8.0-11.11", "linux-tools-host": "6.8.0-11.11", "linux-modules-extra-6.8.0-11-generic": "6.8.0-11.11", "linux-cloud-tools-common": "6.8.0-11.11", "linux-image-6.8.0-11-generic-dbgsym": "6.8.0-11.11", "linux-libc-dev": "6.8.0-11.11", "linux-source-6.8.0": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic-64k-dbgsym": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-headers-6.8.0-11": "6.8.0-11.11", "linux-cloud-tools-6.8.0-11-generic": "6.8.0-11.11", "linux-modules-iwlwifi-6.8.0-11-generic": "6.8.0-11.11", "linux-modules-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-tools-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-cloud-tools-6.8.0-11": "6.8.0-11.11", "linux-buildinfo-6.8.0-11-generic": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic": "6.8.0-11.11", "linux-image-6.8.0-11-generic": "6.8.0-11.11", "linux-tools-common": "6.8.0-11.11", "linux-lib-rust-6.8.0-11-generic": "6.8.0-11.11", "linux-tools-6.8.0-11": "6.8.0-11.11", "linux-tools-6.8.0-11-generic": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic-dbgsym": "6.8.0-11.11", "linux-buildinfo-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-modules-6.8.0-11-generic": "6.8.0-11.11", "linux-headers-6.8.0-11-generic-64k": "6.8.0-11.11" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-extra-6.8.0-1001-aws": "6.8.0-1001.1", "linux-aws-headers-6.8.0-1001": "6.8.0-1001.1", "linux-cloud-tools-6.8.0-1001-aws": "6.8.0-1001.1", "linux-headers-6.8.0-1001-aws": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-aws-dbgsym": "6.8.0-1001.1", "linux-modules-6.8.0-1001-aws": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-aws": "6.8.0-1001.1", "linux-tools-6.8.0-1001-aws": "6.8.0-1001.1", "linux-aws-cloud-tools-6.8.0-1001": "6.8.0-1001.1", "linux-aws-tools-6.8.0-1001": "6.8.0-1001.1", "linux-buildinfo-6.8.0-1001-aws": "6.8.0-1001.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.8.0-1001-azure": "6.8.0-1001.1", "linux-azure-tools-6.8.0-1001": "6.8.0-1001.1", "linux-modules-extra-6.8.0-1001-azure": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-azure-dbgsym": "6.8.0-1001.1", "linux-cloud-tools-6.8.0-1001-azure": "6.8.0-1001.1", "linux-azure-headers-6.8.0-1001": "6.8.0-1001.1", "linux-buildinfo-6.8.0-1001-azure": "6.8.0-1001.1", "linux-modules-6.8.0-1001-azure": "6.8.0-1001.1", "linux-headers-6.8.0-1001-azure": "6.8.0-1001.1", "linux-modules-iwlwifi-6.8.0-1001-azure": "6.8.0-1001.1", "linux-azure-cloud-tools-6.8.0-1001": "6.8.0-1001.1", "linux-tools-6.8.0-1001-azure": "6.8.0-1001.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-gcp-tools-6.8.0-1002": "6.8.0-1002.2", "linux-image-unsigned-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-image-unsigned-6.8.0-1002-gcp-dbgsym": "6.8.0-1002.2", "linux-modules-extra-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-buildinfo-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-gcp-headers-6.8.0-1002": "6.8.0-1002.2", "linux-tools-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-headers-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-modules-iwlwifi-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-modules-6.8.0-1002-gcp": "6.8.0-1002.2" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.8.0-1003-gke": "6.8.0-1003.5", "linux-gke-tools-6.8.0-1003": "6.8.0-1003.5", "linux-modules-extra-6.8.0-1003-gke": "6.8.0-1003.5", "linux-image-unsigned-6.8.0-1003-gke-dbgsym": "6.8.0-1003.5", "linux-headers-6.8.0-1003-gke": "6.8.0-1003.5", "linux-tools-6.8.0-1003-gke": "6.8.0-1003.5", "linux-gke-headers-6.8.0-1003": "6.8.0-1003.5", "linux-modules-6.8.0-1003-gke": "6.8.0-1003.5", "linux-image-unsigned-6.8.0-1003-gke": "6.8.0-1003.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-ibm-tools-6.8.0-1001": "6.8.0-1001.1", "linux-ibm-tools-common": "6.8.0-1001.1", "linux-ibm-source-6.8.0": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-ibm-dbgsym": "6.8.0-1001.1", "linux-modules-extra-6.8.0-1001-ibm": "6.8.0-1001.1", "linux-ibm-headers-6.8.0-1001": "6.8.0-1001.1", "linux-modules-6.8.0-1001-ibm": "6.8.0-1001.1", "linux-headers-6.8.0-1001-ibm": "6.8.0-1001.1", "linux-tools-6.8.0-1001-ibm": "6.8.0-1001.1", "linux-modules-iwlwifi-6.8.0-1001-ibm": "6.8.0-1001.1", "linux-buildinfo-6.8.0-1001-ibm": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-ibm": "6.8.0-1001.1", "linux-ibm-cloud-tools-common": "6.8.0-1001.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.8.0-7-lowlatency": "6.8.0-7.7.1", "linux-headers-6.8.0-7-lowlatency-64k": "6.8.0-7.7.1", "linux-lowlatency-cloud-tools-6.8.0-7": "6.8.0-7.7.1", "linux-buildinfo-6.8.0-7-lowlatency-64k": "6.8.0-7.7.1", "linux-lowlatency-tools-common": "6.8.0-7.7.1", "linux-lowlatency-lib-rust-6.8.0-7-lowlatency": "6.8.0-7.7.1", "linux-tools-6.8.0-7-lowlatency": "6.8.0-7.7.1", "linux-image-unsigned-6.8.0-7-lowlatency-dbgsym": "6.8.0-7.7.1", "linux-lowlatency-tools-host": "6.8.0-7.7.1", "linux-lowlatency-cloud-tools-common": "6.8.0-7.7.1", "linux-image-unsigned-6.8.0-7-lowlatency-64k-dbgsym": "6.8.0-7.7.1", "linux-modules-6.8.0-7-lowlatency-64k": "6.8.0-7.7.1", "linux-image-unsigned-6.8.0-7-lowlatency": "6.8.0-7.7.1", "linux-tools-6.8.0-7-lowlatency-64k": "6.8.0-7.7.1", "linux-lowlatency-headers-6.8.0-7": "6.8.0-7.7.1", "linux-cloud-tools-6.8.0-7-lowlatency": "6.8.0-7.7.1", "linux-modules-6.8.0-7-lowlatency": "6.8.0-7.7.1", "linux-image-unsigned-6.8.0-7-lowlatency-64k": "6.8.0-7.7.1", "linux-lowlatency-tools-6.8.0-7": "6.8.0-7.7.1", "linux-headers-6.8.0-7-lowlatency": "6.8.0-7.7.1", "linux-modules-iwlwifi-6.8.0-7-lowlatency": "6.8.0-7.7.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-nvidia-fs-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-headers-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-dbgsym": "6.8.0-1007.7", "linux-buildinfo-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-modules-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-tools-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-tools-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-64k-dbgsym": "6.8.0-1007.7", "linux-headers-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-modules-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-buildinfo-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-nvidia-tools-6.8.0-1007": "6.8.0-1007.7", "linux-modules-extra-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-nvidia-headers-6.8.0-1007": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-nvidia-tools-host": "6.8.0-1007.7", "linux-modules-nvidia-fs-6.8.0-1007-nvidia-64k": "6.8.0-1007.7" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-nvidia-lowlatency-tools-host": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-tools-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-dbgsym": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k-dbgsym": "6.8.0-1009.9.1", "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-modules-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-modules-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-headers-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-modules-extra-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-buildinfo-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-buildinfo-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-headers-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-nvidia-lowlatency-tools-6.8.0-1009": "6.8.0-1009.9.1", "linux-tools-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-nvidia-lowlatency-headers-6.8.0-1009": "6.8.0-1009.9.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-ivsc-6.8.0-1003-oem": "6.8.0-1003.3", "linux-oem-6.8-tools-6.8.0-1003": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-oem-dbgsym": "6.8.0-1003.3", "linux-headers-6.8.0-1003-oem": "6.8.0-1003.3", "linux-oem-6.8-headers-6.8.0-1003": "6.8.0-1003.3", "linux-tools-6.8.0-1003-oem": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-ipu6-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-iwlwifi-6.8.0-1003-oem": "6.8.0-1003.3", "linux-buildinfo-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-6.8.0-1003-oem": "6.8.0-1003.3" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-6.8.0-1001-oracle": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-oracle-dbgsym": "6.8.0-1001.1", "linux-buildinfo-6.8.0-1001-oracle": "6.8.0-1001.1", "linux-modules-6.8.0-1001-oracle": "6.8.0-1001.1", "linux-modules-extra-6.8.0-1001-oracle": "6.8.0-1001.1", "linux-oracle-headers-6.8.0-1001": "6.8.0-1001.1", "linux-tools-6.8.0-1001-oracle": "6.8.0-1001.1", "linux-modules-iwlwifi-6.8.0-1001-oracle": "6.8.0-1001.1", "linux-oracle-tools-6.8.0-1001": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-oracle": "6.8.0-1001.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-6.7.0-1001-raspi": "6.7.0-1001.1", "linux-buildinfo-6.7.0-1001-raspi": "6.7.0-1001.1", "linux-headers-6.7.0-1001-raspi": "6.7.0-1001.1", "linux-raspi-headers-6.7.0-1001": "6.7.0-1001.1", "linux-image-6.7.0-1001-raspi-dbgsym": "6.7.0-1001.1", "linux-raspi-tools-6.7.0-1001": "6.7.0-1001.1", "linux-tools-6.7.0-1001-raspi": "6.7.0-1001.1", "linux-modules-6.7.0-1001-raspi": "6.7.0-1001.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.8.0-20-generic": "6.8.0-20.20.1", "linux-riscv-headers-6.8.0-20": "6.8.0-20.20.1", "linux-image-6.8.0-20-generic": "6.8.0-20.20.1", "linux-modules-6.8.0-20-generic": "6.8.0-20.20.1", "linux-riscv-tools-6.8.0-20": "6.8.0-20.20.1", "linux-tools-6.8.0-20-generic": "6.8.0-20.20.1", "linux-image-6.8.0-20-generic-dbgsym": "6.8.0-20.20.1", "linux-headers-6.8.0-20-generic": "6.8.0-20.20.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }