A null pointer dereference flaw was found in the hugetlbfsfillsuper function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.4.0-1126-aws": "5.4.0-1126.136~18.04.1", "linux-image-unsigned-5.4.0-1126-aws-dbgsym": "5.4.0-1126.136~18.04.1", "linux-buildinfo-5.4.0-1126-aws": "5.4.0-1126.136~18.04.1", "linux-aws-5.4-cloud-tools-5.4.0-1126": "5.4.0-1126.136~18.04.1", "linux-aws-5.4-headers-5.4.0-1126": "5.4.0-1126.136~18.04.1", "linux-modules-5.4.0-1126-aws": "5.4.0-1126.136~18.04.1", "linux-modules-extra-5.4.0-1126-aws": "5.4.0-1126.136~18.04.1", "linux-cloud-tools-5.4.0-1126-aws": "5.4.0-1126.136~18.04.1", "linux-image-unsigned-5.4.0-1126-aws": "5.4.0-1126.136~18.04.1", "linux-aws-5.4-tools-5.4.0-1126": "5.4.0-1126.136~18.04.1", "linux-tools-5.4.0-1126-aws": "5.4.0-1126.136~18.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.4.0-1131-azure": "5.4.0-1131.138~18.04.1", "linux-azure-5.4-cloud-tools-5.4.0-1131": "5.4.0-1131.138~18.04.1", "linux-modules-5.4.0-1131-azure": "5.4.0-1131.138~18.04.1", "linux-image-unsigned-5.4.0-1131-azure": "5.4.0-1131.138~18.04.1", "linux-azure-5.4-headers-5.4.0-1131": "5.4.0-1131.138~18.04.1", "linux-image-unsigned-5.4.0-1131-azure-dbgsym": "5.4.0-1131.138~18.04.1", "linux-cloud-tools-5.4.0-1131-azure": "5.4.0-1131.138~18.04.1", "linux-modules-extra-5.4.0-1131-azure": "5.4.0-1131.138~18.04.1", "linux-tools-5.4.0-1131-azure": "5.4.0-1131.138~18.04.1", "linux-buildinfo-5.4.0-1131-azure": "5.4.0-1131.138~18.04.1", "linux-azure-5.4-tools-5.4.0-1131": "5.4.0-1131.138~18.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.4.0-1130-gcp-dbgsym": "5.4.0-1130.139~18.04.1", "linux-modules-extra-5.4.0-1130-gcp": "5.4.0-1130.139~18.04.1", "linux-gcp-5.4-tools-5.4.0-1130": "5.4.0-1130.139~18.04.1", "linux-modules-5.4.0-1130-gcp": "5.4.0-1130.139~18.04.1", "linux-headers-5.4.0-1130-gcp": "5.4.0-1130.139~18.04.1", "linux-image-unsigned-5.4.0-1130-gcp": "5.4.0-1130.139~18.04.1", "linux-tools-5.4.0-1130-gcp": "5.4.0-1130.139~18.04.1", "linux-buildinfo-5.4.0-1130-gcp": "5.4.0-1130.139~18.04.1", "linux-gcp-5.4-headers-5.4.0-1130": "5.4.0-1130.139~18.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-5.4.0-186-lowlatency": "5.4.0-186.206~18.04.1", "storage-core-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-cloud-tools-5.4.0-186-lowlatency": "5.4.0-186.206~18.04.1", "linux-modules-5.4.0-186-generic": "5.4.0-186.206~18.04.1", "floppy-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "input-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "nfs-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "serial-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-buildinfo-5.4.0-186-generic": "5.4.0-186.206~18.04.1", "scsi-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "fb-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-tools-5.4.0-186-lowlatency": "5.4.0-186.206~18.04.1", "linux-image-unsigned-5.4.0-186-lowlatency-dbgsym": "5.4.0-186.206~18.04.1", "pata-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "dasd-extra-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-hwe-5.4-cloud-tools-common": "5.4.0-186.206~18.04.1", "block-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "fat-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-modules-5.4.0-186-lowlatency": "5.4.0-186.206~18.04.1", "linux-headers-5.4.0-186-lowlatency": "5.4.0-186.206~18.04.1", "mouse-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-modules-extra-5.4.0-186-generic": "5.4.0-186.206~18.04.1", "vlan-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-cloud-tools-5.4.0-186-generic": "5.4.0-186.206~18.04.1", "sata-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "ipmi-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "nic-usb-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-hwe-5.4-udebs-generic": "5.4.0-186.206~18.04.1", "linux-hwe-5.4-source-5.4.0": "5.4.0-186.206~18.04.1", "linux-hwe-5.4-headers-5.4.0-186": "5.4.0-186.206~18.04.1", "nic-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "pcmcia-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "nic-shared-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-hwe-5.4-tools-5.4.0-186": "5.4.0-186.206~18.04.1", "ppp-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "crypto-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "pcmcia-storage-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "plip-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-headers-5.4.0-186-generic": "5.4.0-186.206~18.04.1", "fs-core-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-hwe-5.4-tools-common": "5.4.0-186.206~18.04.1", "virtio-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "fs-secondary-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-image-unsigned-5.4.0-186-generic": "5.4.0-186.206~18.04.1", "parport-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-image-unsigned-5.4.0-186-generic-dbgsym": "5.4.0-186.206~18.04.1", "kernel-image-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-image-unsigned-5.4.0-186-lowlatency": "5.4.0-186.206~18.04.1", "message-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-tools-5.4.0-186-generic": "5.4.0-186.206~18.04.1", "firewire-core-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "usb-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "md-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "linux-hwe-5.4-cloud-tools-5.4.0-186": "5.4.0-186.206~18.04.1", "multipath-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "dasd-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1", "nic-pcmcia-modules-5.4.0-186-generic-di": "5.4.0-186.206~18.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "linux-tools-5.4.0-1073-ibm": "5.4.0-1073.78~18.04.1", "linux-headers-5.4.0-1073-ibm": "5.4.0-1073.78~18.04.1", "linux-ibm-5.4-tools-5.4.0-1073": "5.4.0-1073.78~18.04.1", "linux-buildinfo-5.4.0-1073-ibm": "5.4.0-1073.78~18.04.1", "linux-modules-5.4.0-1073-ibm": "5.4.0-1073.78~18.04.1", "linux-image-unsigned-5.4.0-1073-ibm-dbgsym": "5.4.0-1073.78~18.04.1", "linux-image-unsigned-5.4.0-1073-ibm": "5.4.0-1073.78~18.04.1", "linux-ibm-5.4-cloud-tools-common": "5.4.0-1073.78~18.04.1", "linux-ibm-5.4-headers-5.4.0-1073": "5.4.0-1073.78~18.04.1", "linux-ibm-5.4-tools-common": "5.4.0-1073.78~18.04.1", "linux-modules-extra-5.4.0-1073-ibm": "5.4.0-1073.78~18.04.1", "linux-ibm-5.4-source-5.4.0": "5.4.0-1073.78~18.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.4.0-1125-oracle": "5.4.0-1125.134~18.04.1", "linux-modules-extra-5.4.0-1125-oracle": "5.4.0-1125.134~18.04.1", "linux-oracle-5.4-tools-5.4.0-1125": "5.4.0-1125.134~18.04.1", "linux-modules-5.4.0-1125-oracle": "5.4.0-1125.134~18.04.1", "linux-tools-5.4.0-1125-oracle": "5.4.0-1125.134~18.04.1", "linux-image-unsigned-5.4.0-1125-oracle-dbgsym": "5.4.0-1125.134~18.04.1", "linux-image-unsigned-5.4.0-1125-oracle": "5.4.0-1125.134~18.04.1", "linux-oracle-5.4-headers-5.4.0-1125": "5.4.0-1125.134~18.04.1", "linux-buildinfo-5.4.0-1125-oracle": "5.4.0-1125.134~18.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.4.0-1110-raspi": "5.4.0-1110.122~18.04.1", "linux-modules-5.4.0-1110-raspi": "5.4.0-1110.122~18.04.1", "linux-buildinfo-5.4.0-1110-raspi": "5.4.0-1110.122~18.04.1", "linux-tools-5.4.0-1110-raspi": "5.4.0-1110.122~18.04.1", "linux-image-5.4.0-1110-raspi-dbgsym": "5.4.0-1110.122~18.04.1", "linux-raspi-5.4-headers-5.4.0-1110": "5.4.0-1110.122~18.04.1", "linux-image-5.4.0-1110-raspi": "5.4.0-1110.122~18.04.1", "linux-raspi-5.4-tools-5.4.0-1110": "5.4.0-1110.122~18.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "nic-pcmcia-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-buildinfo-5.4.0-186-lowlatency": "5.4.0-186.206", "linux-image-5.4.0-186-generic-lpae": "5.4.0-186.206", "storage-core-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-modules-5.4.0-186-generic-lpae": "5.4.0-186.206", "linux-cloud-tools-5.4.0-186-lowlatency": "5.4.0-186.206", "fs-core-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "nic-shared-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-modules-5.4.0-186-generic": "5.4.0-186.206", "floppy-modules-5.4.0-186-generic-di": "5.4.0-186.206", "input-modules-5.4.0-186-generic-di": "5.4.0-186.206", "nfs-modules-5.4.0-186-generic-di": "5.4.0-186.206", "plip-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "mouse-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "serial-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-udebs-generic": "5.4.0-186.206", "crypto-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-buildinfo-5.4.0-186-generic": "5.4.0-186.206", "scsi-modules-5.4.0-186-generic-di": "5.4.0-186.206", "fb-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-tools-5.4.0-186-lowlatency": "5.4.0-186.206", "linux-image-5.4.0-186-generic": "5.4.0-186.206", "linux-headers-5.4.0-186-generic-lpae": "5.4.0-186.206", "linux-image-unsigned-5.4.0-186-lowlatency-dbgsym": "5.4.0-186.206", "pata-modules-5.4.0-186-generic-di": "5.4.0-186.206", "dasd-extra-modules-5.4.0-186-generic-di": "5.4.0-186.206", "vlan-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-buildinfo-5.4.0-186-generic-lpae": "5.4.0-186.206", "block-modules-5.4.0-186-generic-di": "5.4.0-186.206", "fat-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-modules-5.4.0-186-lowlatency": "5.4.0-186.206", "fs-secondary-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-headers-5.4.0-186-lowlatency": "5.4.0-186.206", "mouse-modules-5.4.0-186-generic-di": "5.4.0-186.206", "fat-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "vlan-modules-5.4.0-186-generic-di": "5.4.0-186.206", "block-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-modules-extra-5.4.0-186-generic": "5.4.0-186.206", "linux-cloud-tools-5.4.0-186-generic": "5.4.0-186.206", "sata-modules-5.4.0-186-generic-di": "5.4.0-186.206", "nic-usb-modules-5.4.0-186-generic-di": "5.4.0-186.206", "nic-usb-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-cloud-tools-common": "5.4.0-186.206", "ipmi-modules-5.4.0-186-generic-di": "5.4.0-186.206", "nfs-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "nic-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-libc-dev": "5.4.0-186.206", "ipmi-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "pcmcia-modules-5.4.0-186-generic-di": "5.4.0-186.206", "nic-shared-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-doc": "5.4.0-186.206", "md-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "ppp-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-source-5.4.0": "5.4.0-186.206", "scsi-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "kernel-image-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "crypto-modules-5.4.0-186-generic-di": "5.4.0-186.206", "sata-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "ppp-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-headers-5.4.0-186": "5.4.0-186.206", "pcmcia-storage-modules-5.4.0-186-generic-di": "5.4.0-186.206", "plip-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-headers-5.4.0-186-generic": "5.4.0-186.206", "storage-core-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "multipath-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "fs-core-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-cloud-tools-5.4.0-186": "5.4.0-186.206", "linux-tools-5.4.0-186-generic-lpae": "5.4.0-186.206", "linux-tools-host": "5.4.0-186.206", "input-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-image-5.4.0-186-generic-lpae-dbgsym": "5.4.0-186.206", "nic-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "linux-udebs-generic-lpae": "5.4.0-186.206", "fs-secondary-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-image-unsigned-5.4.0-186-generic": "5.4.0-186.206", "virtio-modules-5.4.0-186-generic-di": "5.4.0-186.206", "parport-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-image-unsigned-5.4.0-186-generic-dbgsym": "5.4.0-186.206", "kernel-image-5.4.0-186-generic-di": "5.4.0-186.206", "linux-image-unsigned-5.4.0-186-lowlatency": "5.4.0-186.206", "message-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-tools-5.4.0-186-generic": "5.4.0-186.206", "firewire-core-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-tools-common": "5.4.0-186.206", "md-modules-5.4.0-186-generic-di": "5.4.0-186.206", "usb-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "multipath-modules-5.4.0-186-generic-di": "5.4.0-186.206", "usb-modules-5.4.0-186-generic-di": "5.4.0-186.206", "parport-modules-5.4.0-186-generic-lpae-di": "5.4.0-186.206", "dasd-modules-5.4.0-186-generic-di": "5.4.0-186.206", "linux-image-5.4.0-186-generic-dbgsym": "5.4.0-186.206", "linux-tools-5.4.0-186": "5.4.0-186.206" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.4.0-1126-aws": "5.4.0-1126.136", "linux-image-unsigned-5.4.0-1126-aws-dbgsym": "5.4.0-1126.136", "linux-buildinfo-5.4.0-1126-aws": "5.4.0-1126.136", "linux-modules-extra-5.4.0-1126-aws": "5.4.0-1126.136", "linux-aws-cloud-tools-5.4.0-1126": "5.4.0-1126.136", "linux-modules-5.4.0-1126-aws": "5.4.0-1126.136", "linux-cloud-tools-5.4.0-1126-aws": "5.4.0-1126.136", "linux-aws-headers-5.4.0-1126": "5.4.0-1126.136", "linux-aws-tools-5.4.0-1126": "5.4.0-1126.136", "linux-image-unsigned-5.4.0-1126-aws": "5.4.0-1126.136", "linux-tools-5.4.0-1126-aws": "5.4.0-1126.136" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1", "linux-aws-5.15-headers-5.15.0-1063": "5.15.0-1063.69~20.04.1", "linux-image-unsigned-5.15.0-1063-aws-dbgsym": "5.15.0-1063.69~20.04.1", "linux-modules-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1", "linux-headers-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1", "linux-cloud-tools-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1", "linux-tools-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1", "linux-buildinfo-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1", "linux-aws-5.15-tools-5.15.0-1063": "5.15.0-1063.69~20.04.1", "linux-modules-extra-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1", "linux-aws-5.15-cloud-tools-5.15.0-1063": "5.15.0-1063.69~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-azure-headers-5.4.0-1131": "5.4.0-1131.138", "linux-azure-cloud-tools-5.4.0-1131": "5.4.0-1131.138", "linux-modules-5.4.0-1131-azure": "5.4.0-1131.138", "linux-image-unsigned-5.4.0-1131-azure": "5.4.0-1131.138", "linux-image-unsigned-5.4.0-1131-azure-dbgsym": "5.4.0-1131.138", "linux-azure-tools-5.4.0-1131": "5.4.0-1131.138", "linux-cloud-tools-5.4.0-1131-azure": "5.4.0-1131.138", "linux-modules-extra-5.4.0-1131-azure": "5.4.0-1131.138", "linux-headers-5.4.0-1131-azure": "5.4.0-1131.138", "linux-buildinfo-5.4.0-1131-azure": "5.4.0-1131.138", "linux-tools-5.4.0-1131-azure": "5.4.0-1131.138" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-azure-5.15-cloud-tools-5.15.0-1065": "5.15.0-1065.74~20.04.1", "linux-buildinfo-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1", "linux-headers-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1", "linux-modules-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1", "linux-azure-5.15-headers-5.15.0-1065": "5.15.0-1065.74~20.04.1", "linux-azure-5.15-tools-5.15.0-1065": "5.15.0-1065.74~20.04.1", "linux-cloud-tools-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1", "linux-modules-extra-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1", "linux-image-unsigned-5.15.0-1065-azure-dbgsym": "5.15.0-1065.74~20.04.1", "linux-tools-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1", "linux-image-unsigned-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.15.0-1065-azure-fde-dbgsym": "5.15.0-1065.74~20.04.1.1", "linux-image-unsigned-5.15.0-1065-azure-fde": "5.15.0-1065.74~20.04.1.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.4.0-1086-bluefield-dbgsym": "5.4.0-1086.93", "linux-buildinfo-5.4.0-1086-bluefield": "5.4.0-1086.93", "linux-bluefield-headers-5.4.0-1086": "5.4.0-1086.93", "linux-bluefield-tools-5.4.0-1086": "5.4.0-1086.93", "linux-image-unsigned-5.4.0-1086-bluefield": "5.4.0-1086.93", "linux-headers-5.4.0-1086-bluefield": "5.4.0-1086.93", "linux-modules-5.4.0-1086-bluefield": "5.4.0-1086.93", "linux-tools-5.4.0-1086-bluefield": "5.4.0-1086.93" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-extra-5.4.0-1130-gcp": "5.4.0-1130.139", "linux-tools-5.4.0-1130-gcp": "5.4.0-1130.139", "linux-image-unsigned-5.4.0-1130-gcp": "5.4.0-1130.139", "linux-headers-5.4.0-1130-gcp": "5.4.0-1130.139", "linux-modules-5.4.0-1130-gcp": "5.4.0-1130.139", "linux-buildinfo-5.4.0-1130-gcp": "5.4.0-1130.139", "linux-gcp-tools-5.4.0-1130": "5.4.0-1130.139", "linux-gcp-headers-5.4.0-1130": "5.4.0-1130.139", "linux-image-unsigned-5.4.0-1130-gcp-dbgsym": "5.4.0-1130.139" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1", "linux-image-unsigned-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1", "linux-modules-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1", "linux-gcp-5.15-tools-5.15.0-1062": "5.15.0-1062.70~20.04.1", "linux-image-unsigned-5.15.0-1062-gcp-dbgsym": "5.15.0-1062.70~20.04.1", "linux-gcp-5.15-headers-5.15.0-1062": "5.15.0-1062.70~20.04.1", "linux-modules-iwlwifi-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1", "linux-headers-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1", "linux-modules-extra-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1", "linux-tools-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-cloud-tools-5.4.0-1093-gkeop": "5.4.0-1093.97", "linux-gkeop-source-5.4.0": "5.4.0-1093.97", "linux-image-unsigned-5.4.0-1093-gkeop-dbgsym": "5.4.0-1093.97", "linux-tools-5.4.0-1093-gkeop": "5.4.0-1093.97", "linux-modules-5.4.0-1093-gkeop": "5.4.0-1093.97", "linux-buildinfo-5.4.0-1093-gkeop": "5.4.0-1093.97", "linux-gkeop-tools-5.4.0-1093": "5.4.0-1093.97", "linux-gkeop-cloud-tools-5.4.0-1093": "5.4.0-1093.97", "linux-modules-extra-5.4.0-1093-gkeop": "5.4.0-1093.97", "linux-image-unsigned-5.4.0-1093-gkeop": "5.4.0-1093.97", "linux-gkeop-headers-5.4.0-1093": "5.4.0-1093.97", "linux-headers-5.4.0-1093-gkeop": "5.4.0-1093.97" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-cloud-tools-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1", "linux-headers-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1", "linux-gkeop-5.15-headers-5.15.0-1046": "5.15.0-1046.53~20.04.1", "linux-gkeop-5.15-tools-5.15.0-1046": "5.15.0-1046.53~20.04.1", "linux-modules-extra-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1", "linux-image-unsigned-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1", "linux-image-unsigned-5.15.0-1046-gkeop-dbgsym": "5.15.0-1046.53~20.04.1", "linux-modules-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1", "linux-gkeop-5.15-cloud-tools-5.15.0-1046": "5.15.0-1046.53~20.04.1", "linux-buildinfo-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1", "linux-tools-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1", "linux-modules-extra-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-buildinfo-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1", "linux-hwe-5.15-cloud-tools-common": "5.15.0-113.123~20.04.1", "linux-image-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-image-5.15.0-113-generic-dbgsym": "5.15.0-113.123~20.04.1", "linux-image-unsigned-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1", "linux-hwe-5.15-headers-5.15.0-113": "5.15.0-113.123~20.04.1", "linux-modules-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-hwe-5.15-tools-common": "5.15.0-113.123~20.04.1", "linux-modules-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1", "linux-image-5.15.0-113-generic-lpae-dbgsym": "5.15.0-113.123~20.04.1", "linux-image-unsigned-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-hwe-5.15-source-5.15.0": "5.15.0-113.123~20.04.1", "linux-buildinfo-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1", "linux-modules-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1", "linux-modules-iwlwifi-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-tools-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1", "linux-headers-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1", "linux-hwe-5.15-cloud-tools-5.15.0-113": "5.15.0-113.123~20.04.1", "linux-tools-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1", "linux-tools-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-cloud-tools-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-buildinfo-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-headers-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1", "linux-image-unsigned-5.15.0-113-generic-64k-dbgsym": "5.15.0-113.123~20.04.1", "linux-image-unsigned-5.15.0-113-generic-dbgsym": "5.15.0-113.123~20.04.1", "linux-headers-5.15.0-113-generic": "5.15.0-113.123~20.04.1", "linux-hwe-5.15-tools-host": "5.15.0-113.123~20.04.1", "linux-hwe-5.15-tools-5.15.0-113": "5.15.0-113.123~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-tools-5.4.0-1073-ibm": "5.4.0-1073.78", "linux-ibm-tools-common": "5.4.0-1073.78", "linux-headers-5.4.0-1073-ibm": "5.4.0-1073.78", "linux-ibm-tools-5.4.0-1073": "5.4.0-1073.78", "linux-buildinfo-5.4.0-1073-ibm": "5.4.0-1073.78", "linux-modules-5.4.0-1073-ibm": "5.4.0-1073.78", "linux-image-unsigned-5.4.0-1073-ibm-dbgsym": "5.4.0-1073.78", "linux-image-unsigned-5.4.0-1073-ibm": "5.4.0-1073.78", "linux-ibm-source-5.4.0": "5.4.0-1073.78", "linux-ibm-cloud-tools-common": "5.4.0-1073.78", "linux-modules-extra-5.4.0-1073-ibm": "5.4.0-1073.78", "linux-ibm-headers-5.4.0-1073": "5.4.0-1073.78" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1", "linux-modules-extra-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1", "linux-image-unsigned-5.15.0-1057-ibm-dbgsym": "5.15.0-1057.60~20.04.1", "linux-ibm-5.15-source-5.15.0": "5.15.0-1057.60~20.04.1", "linux-ibm-5.15-headers-5.15.0-1057": "5.15.0-1057.60~20.04.1", "linux-tools-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1", "linux-buildinfo-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1", "linux-image-unsigned-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1", "linux-ibm-5.15-tools-5.15.0-1057": "5.15.0-1057.60~20.04.1", "linux-modules-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-intel-iotg-5.15-tools-common": "5.15.0-1058.64~20.04.1", "linux-cloud-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-intel-iotg-5.15-headers-5.15.0-1058": "5.15.0-1058.64~20.04.1", "linux-modules-extra-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-modules-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-image-unsigned-5.15.0-1058-intel-iotg-dbgsym": "5.15.0-1058.64~20.04.1", "linux-buildinfo-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-intel-iotg-5.15-cloud-tools-5.15.0-1058": "5.15.0-1058.64~20.04.1", "linux-modules-iwlwifi-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-image-unsigned-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-headers-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1", "linux-intel-iotg-5.15-cloud-tools-common": "5.15.0-1058.64~20.04.1", "linux-intel-iotg-5.15-tools-5.15.0-1058": "5.15.0-1058.64~20.04.1", "linux-intel-iotg-5.15-tools-host": "5.15.0-1058.64~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-5.4.0-1038-iot-dbgsym": "5.4.0-1038.39", "linux-iot-tools-common": "5.4.0-1038.39", "linux-modules-5.4.0-1038-iot": "5.4.0-1038.39", "linux-headers-5.4.0-1038-iot": "5.4.0-1038.39", "linux-image-unsigned-5.4.0-1038-iot-dbgsym": "5.4.0-1038.39", "linux-tools-5.4.0-1038-iot": "5.4.0-1038.39", "linux-buildinfo-5.4.0-1038-iot": "5.4.0-1038.39", "linux-iot-tools-5.4.0-1038": "5.4.0-1038.39", "linux-iot-headers-5.4.0-1038": "5.4.0-1038.39", "linux-image-unsigned-5.4.0-1038-iot": "5.4.0-1038.39", "linux-image-5.4.0-1038-iot": "5.4.0-1038.39" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-kvm-tools-5.4.0-1114": "5.4.0-1114.121", "linux-headers-5.4.0-1114-kvm": "5.4.0-1114.121", "linux-image-unsigned-5.4.0-1114-kvm-dbgsym": "5.4.0-1114.121", "linux-buildinfo-5.4.0-1114-kvm": "5.4.0-1114.121", "linux-image-unsigned-5.4.0-1114-kvm": "5.4.0-1114.121", "linux-tools-5.4.0-1114-kvm": "5.4.0-1114.121", "linux-kvm-headers-5.4.0-1114": "5.4.0-1114.121", "linux-modules-5.4.0-1114-kvm": "5.4.0-1114.121" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-110": "5.15.0-110.120~20.04.1", "linux-modules-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1", "linux-lowlatency-hwe-5.15-tools-5.15.0-110": "5.15.0-110.120~20.04.1", "linux-image-unsigned-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1", "linux-headers-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1", "linux-buildinfo-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1", "linux-image-unsigned-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1", "linux-cloud-tools-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1", "linux-modules-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1", "linux-modules-iwlwifi-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1", "linux-image-unsigned-5.15.0-110-lowlatency-dbgsym": "5.15.0-110.120~20.04.1", "linux-lowlatency-hwe-5.15-cloud-tools-common": "5.15.0-110.120~20.04.1", "linux-lowlatency-hwe-5.15-headers-5.15.0-110": "5.15.0-110.120~20.04.1", "linux-lowlatency-hwe-5.15-tools-common": "5.15.0-110.120~20.04.1", "linux-lowlatency-hwe-5.15-tools-host": "5.15.0-110.120~20.04.1", "linux-tools-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1", "linux-buildinfo-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1", "linux-image-unsigned-5.15.0-110-lowlatency-64k-dbgsym": "5.15.0-110.120~20.04.1", "linux-headers-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1", "linux-tools-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.4.0-1125-oracle": "5.4.0-1125.134", "linux-modules-extra-5.4.0-1125-oracle": "5.4.0-1125.134", "linux-oracle-tools-5.4.0-1125": "5.4.0-1125.134", "linux-modules-5.4.0-1125-oracle": "5.4.0-1125.134", "linux-tools-5.4.0-1125-oracle": "5.4.0-1125.134", "linux-image-unsigned-5.4.0-1125-oracle-dbgsym": "5.4.0-1125.134", "linux-oracle-headers-5.4.0-1125": "5.4.0-1125.134", "linux-image-unsigned-5.4.0-1125-oracle": "5.4.0-1125.134", "linux-buildinfo-5.4.0-1125-oracle": "5.4.0-1125.134" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-oracle-5.15-tools-5.15.0-1061": "5.15.0-1061.67~20.04.1", "linux-oracle-5.15-headers-5.15.0-1061": "5.15.0-1061.67~20.04.1", "linux-image-unsigned-5.15.0-1061-oracle-dbgsym": "5.15.0-1061.67~20.04.1", "linux-modules-extra-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1", "linux-buildinfo-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1", "linux-headers-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1", "linux-modules-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1", "linux-tools-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1", "linux-image-unsigned-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.4.0-1110-raspi": "5.4.0-1110.122", "linux-modules-5.4.0-1110-raspi": "5.4.0-1110.122", "linux-buildinfo-5.4.0-1110-raspi": "5.4.0-1110.122", "linux-tools-5.4.0-1110-raspi": "5.4.0-1110.122", "linux-raspi-headers-5.4.0-1110": "5.4.0-1110.122", "linux-image-5.4.0-1110-raspi-dbgsym": "5.4.0-1110.122", "linux-image-5.4.0-1110-raspi": "5.4.0-1110.122", "linux-raspi-tools-5.4.0-1110": "5.4.0-1110.122" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1", "linux-image-5.15.0-1059-generic-dbgsym": "5.15.0-1059.63~20.04.1", "linux-headers-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1", "linux-tools-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1", "linux-modules-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1", "linux-riscv-5.15-tools-5.15.0-1059": "5.15.0-1059.63~20.04.1", "linux-modules-extra-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1", "linux-riscv-5.15-headers-5.15.0-1059": "5.15.0-1059.63~20.04.1", "linux-image-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-5.4.0-1045-xilinx-zynqmp": "5.4.0-1045.49", "linux-xilinx-zynqmp-tools-5.4.0-1045": "5.4.0-1045.49", "linux-tools-5.4.0-1045-xilinx-zynqmp": "5.4.0-1045.49", "linux-image-5.4.0-1045-xilinx-zynqmp-dbgsym": "5.4.0-1045.49", "linux-xilinx-zynqmp-headers-5.4.0-1045": "5.4.0-1045.49", "linux-buildinfo-5.4.0-1045-xilinx-zynqmp": "5.4.0-1045.49", "linux-modules-5.4.0-1045-xilinx-zynqmp": "5.4.0-1045.49", "linux-headers-5.4.0-1045-xilinx-zynqmp": "5.4.0-1045.49" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.15.0-112-generic-64k": "5.15.0-112.122", "linux-cloud-tools-5.15.0-112-generic": "5.15.0-112.122", "linux-headers-5.15.0-112-generic": "5.15.0-112.122", "linux-cloud-tools-common": "5.15.0-112.122", "linux-buildinfo-5.15.0-112-generic-lpae": "5.15.0-112.122", "linux-libc-dev": "5.15.0-112.122", "linux-buildinfo-5.15.0-112-generic": "5.15.0-112.122", "linux-doc": "5.15.0-112.122", "linux-buildinfo-5.15.0-112-generic-64k": "5.15.0-112.122", "linux-modules-iwlwifi-5.15.0-112-generic": "5.15.0-112.122", "linux-cloud-tools-5.15.0-112": "5.15.0-112.122", "linux-tools-5.15.0-112-generic": "5.15.0-112.122", "linux-image-5.15.0-112-generic": "5.15.0-112.122", "linux-image-5.15.0-112-generic-lpae-dbgsym": "5.15.0-112.122", "linux-source-5.15.0": "5.15.0-112.122", "linux-image-5.15.0-112-generic-lpae": "5.15.0-112.122", "linux-image-5.15.0-112-generic-dbgsym": "5.15.0-112.122", "linux-headers-5.15.0-112-generic-lpae": "5.15.0-112.122", "linux-tools-5.15.0-112": "5.15.0-112.122", "linux-modules-5.15.0-112-generic-lpae": "5.15.0-112.122", "linux-image-unsigned-5.15.0-112-generic": "5.15.0-112.122", "linux-tools-host": "5.15.0-112.122", "linux-modules-5.15.0-112-generic-64k": "5.15.0-112.122", "linux-tools-5.15.0-112-generic-64k": "5.15.0-112.122", "linux-modules-5.15.0-112-generic": "5.15.0-112.122", "linux-tools-5.15.0-112-generic-lpae": "5.15.0-112.122", "linux-headers-5.15.0-112": "5.15.0-112.122", "linux-modules-extra-5.15.0-112-generic": "5.15.0-112.122", "linux-tools-common": "5.15.0-112.122", "linux-headers-5.15.0-112-generic-64k": "5.15.0-112.122", "linux-image-unsigned-5.15.0-112-generic-64k-dbgsym": "5.15.0-112.122", "linux-image-unsigned-5.15.0-112-generic-dbgsym": "5.15.0-112.122" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.15.0-1063-aws": "5.15.0-1063.69", "linux-modules-5.15.0-1063-aws": "5.15.0-1063.69", "linux-image-unsigned-5.15.0-1063-aws-dbgsym": "5.15.0-1063.69", "linux-aws-tools-5.15.0-1063": "5.15.0-1063.69", "linux-headers-5.15.0-1063-aws": "5.15.0-1063.69", "linux-cloud-tools-5.15.0-1063-aws": "5.15.0-1063.69", "linux-tools-5.15.0-1063-aws": "5.15.0-1063.69", "linux-aws-cloud-tools-5.15.0-1063": "5.15.0-1063.69", "linux-buildinfo-5.15.0-1063-aws": "5.15.0-1063.69", "linux-modules-extra-5.15.0-1063-aws": "5.15.0-1063.69", "linux-aws-headers-5.15.0-1063": "5.15.0-1063.69" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-tools-6.5.0-1023-aws": "6.5.0-1023.23~22.04.1", "linux-image-unsigned-6.5.0-1023-aws": "6.5.0-1023.23~22.04.1", "linux-image-unsigned-6.5.0-1023-aws-dbgsym": "6.5.0-1023.23~22.04.1", "linux-headers-6.5.0-1023-aws": "6.5.0-1023.23~22.04.1", "linux-aws-6.5-headers-6.5.0-1023": "6.5.0-1023.23~22.04.1", "linux-modules-extra-6.5.0-1023-aws": "6.5.0-1023.23~22.04.1", "linux-buildinfo-6.5.0-1023-aws": "6.5.0-1023.23~22.04.1", "linux-aws-6.5-cloud-tools-6.5.0-1023": "6.5.0-1023.23~22.04.1", "linux-modules-6.5.0-1023-aws": "6.5.0-1023.23~22.04.1", "linux-cloud-tools-6.5.0-1023-aws": "6.5.0-1023.23~22.04.1", "linux-aws-6.5-tools-6.5.0-1023": "6.5.0-1023.23~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-5.15.0-1066-azure": "5.15.0-1066.75", "linux-azure-cloud-tools-5.15.0-1066": "5.15.0-1066.75", "linux-azure-tools-5.15.0-1066": "5.15.0-1066.75", "linux-buildinfo-5.15.0-1066-azure": "5.15.0-1066.75", "linux-tools-5.15.0-1066-azure": "5.15.0-1066.75", "linux-azure-headers-5.15.0-1066": "5.15.0-1066.75", "linux-modules-5.15.0-1066-azure": "5.15.0-1066.75", "linux-image-unsigned-5.15.0-1066-azure-dbgsym": "5.15.0-1066.75", "linux-modules-extra-5.15.0-1066-azure": "5.15.0-1066.75", "linux-cloud-tools-5.15.0-1066-azure": "5.15.0-1066.75", "linux-image-unsigned-5.15.0-1066-azure": "5.15.0-1066.75" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-cloud-tools-6.5.0-1024-azure": "6.5.0-1024.25~22.04.1", "linux-modules-6.5.0-1024-azure": "6.5.0-1024.25~22.04.1", "linux-image-unsigned-6.5.0-1024-azure": "6.5.0-1024.25~22.04.1", "linux-tools-6.5.0-1024-azure": "6.5.0-1024.25~22.04.1", "linux-azure-6.5-headers-6.5.0-1024": "6.5.0-1024.25~22.04.1", "linux-image-unsigned-6.5.0-1024-azure-dbgsym": "6.5.0-1024.25~22.04.1", "linux-modules-extra-6.5.0-1024-azure": "6.5.0-1024.25~22.04.1", "linux-azure-6.5-tools-6.5.0-1024": "6.5.0-1024.25~22.04.1", "linux-buildinfo-6.5.0-1024-azure": "6.5.0-1024.25~22.04.1", "linux-headers-6.5.0-1024-azure": "6.5.0-1024.25~22.04.1", "linux-azure-6.5-cloud-tools-6.5.0-1024": "6.5.0-1024.25~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.15.0-1067-azure-fde": "5.15.0-1067.76.1", "linux-image-unsigned-5.15.0-1067-azure-fde-dbgsym": "5.15.0-1067.76.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-gcp-tools-5.15.0-1062": "5.15.0-1062.70", "linux-image-unsigned-5.15.0-1062-gcp": "5.15.0-1062.70", "linux-gcp-headers-5.15.0-1062": "5.15.0-1062.70", "linux-modules-extra-5.15.0-1062-gcp": "5.15.0-1062.70", "linux-modules-5.15.0-1062-gcp": "5.15.0-1062.70", "linux-image-unsigned-5.15.0-1062-gcp-dbgsym": "5.15.0-1062.70", "linux-headers-5.15.0-1062-gcp": "5.15.0-1062.70", "linux-buildinfo-5.15.0-1062-gcp": "5.15.0-1062.70", "linux-tools-5.15.0-1062-gcp": "5.15.0-1062.70" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-iwlwifi-6.5.0-1024-gcp": "6.5.0-1024.26~22.04.1", "linux-gcp-6.5-tools-6.5.0-1024": "6.5.0-1024.26~22.04.1", "linux-modules-extra-6.5.0-1024-gcp": "6.5.0-1024.26~22.04.1", "linux-image-unsigned-6.5.0-1024-gcp": "6.5.0-1024.26~22.04.1", "linux-headers-6.5.0-1024-gcp": "6.5.0-1024.26~22.04.1", "linux-modules-6.5.0-1024-gcp": "6.5.0-1024.26~22.04.1", "linux-gcp-6.5-headers-6.5.0-1024": "6.5.0-1024.26~22.04.1", "linux-image-unsigned-6.5.0-1024-gcp-dbgsym": "6.5.0-1024.26~22.04.1", "linux-tools-6.5.0-1024-gcp": "6.5.0-1024.26~22.04.1", "linux-buildinfo-6.5.0-1024-gcp": "6.5.0-1024.26~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-gke-tools-5.15.0-1060": "5.15.0-1060.66", "linux-tools-5.15.0-1060-gke": "5.15.0-1060.66", "linux-modules-5.15.0-1060-gke": "5.15.0-1060.66", "linux-gke-headers-5.15.0-1060": "5.15.0-1060.66", "linux-image-unsigned-5.15.0-1060-gke-dbgsym": "5.15.0-1060.66", "linux-headers-5.15.0-1060-gke": "5.15.0-1060.66", "linux-buildinfo-5.15.0-1060-gke": "5.15.0-1060.66", "linux-modules-extra-5.15.0-1060-gke": "5.15.0-1060.66", "linux-image-unsigned-5.15.0-1060-gke": "5.15.0-1060.66" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-cloud-tools-5.15.0-1046-gkeop": "5.15.0-1046.53", "linux-headers-5.15.0-1046-gkeop": "5.15.0-1046.53", "linux-modules-extra-5.15.0-1046-gkeop": "5.15.0-1046.53", "linux-image-unsigned-5.15.0-1046-gkeop": "5.15.0-1046.53", "linux-gkeop-cloud-tools-5.15.0-1046": "5.15.0-1046.53", "linux-image-unsigned-5.15.0-1046-gkeop-dbgsym": "5.15.0-1046.53", "linux-gkeop-tools-5.15.0-1046": "5.15.0-1046.53", "linux-tools-5.15.0-1046-gkeop": "5.15.0-1046.53", "linux-buildinfo-5.15.0-1046-gkeop": "5.15.0-1046.53", "linux-gkeop-headers-5.15.0-1046": "5.15.0-1046.53", "linux-modules-5.15.0-1046-gkeop": "5.15.0-1046.53" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-6.5.0-44-generic-64k": "6.5.0-44.44~22.04.1", "linux-headers-6.5.0-44-generic-64k": "6.5.0-44.44~22.04.1", "linux-image-unsigned-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-modules-extra-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-image-unsigned-6.5.0-44-generic-dbgsym": "6.5.0-44.44~22.04.1", "linux-modules-ipu6-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-buildinfo-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-image-unsigned-6.5.0-44-generic-64k": "6.5.0-44.44~22.04.1", "linux-tools-6.5.0-44-generic-64k": "6.5.0-44.44~22.04.1", "linux-hwe-6.5-tools-host": "6.5.0-44.44~22.04.1", "linux-source-6.5.0": "6.5.0-44.44~22.04.1", "linux-tools-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-headers-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-hwe-6.5-cloud-tools-common": "6.5.0-44.44~22.04.1", "linux-cloud-tools-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-hwe-6.5-tools-common": "6.5.0-44.44~22.04.1", "linux-hwe-6.5-cloud-tools-6.5.0-44": "6.5.0-44.44~22.04.1", "linux-image-6.5.0-44-generic-dbgsym": "6.5.0-44.44~22.04.1", "linux-buildinfo-6.5.0-44-generic-64k": "6.5.0-44.44~22.04.1", "linux-hwe-6.5-headers-6.5.0-44": "6.5.0-44.44~22.04.1", "linux-image-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-modules-iwlwifi-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-modules-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-hwe-6.5-tools-6.5.0-44": "6.5.0-44.44~22.04.1", "linux-modules-ivsc-6.5.0-44-generic": "6.5.0-44.44~22.04.1", "linux-image-unsigned-6.5.0-44-generic-64k-dbgsym": "6.5.0-44.44~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-6.8.0-38-generic-64k-dbgsym": "6.8.0-38.38~22.04.1", "linux-buildinfo-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-modules-iwlwifi-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-image-6.8.0-38-generic-dbgsym": "6.8.0-38.38~22.04.1", "linux-cloud-tools-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-modules-ipu6-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-headers-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-tools-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-headers-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-hwe-6.8-cloud-tools-6.8.0-38": "6.8.0-38.38~22.04.1", "linux-modules-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-modules-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-modules-usbio-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-hwe-6.8-tools-6.8.0-38": "6.8.0-38.38~22.04.1", "linux-image-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-hwe-6.8-headers-6.8.0-38": "6.8.0-38.38~22.04.1", "linux-image-unsigned-6.8.0-38-generic-dbgsym": "6.8.0-38.38~22.04.1", "linux-buildinfo-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-image-unsigned-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1", "linux-modules-extra-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-image-unsigned-6.8.0-38-generic": "6.8.0-38.38~22.04.1", "linux-tools-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-extra-5.15.0-1056-ibm": "5.15.0-1056.59", "linux-ibm-tools-common": "5.15.0-1056.59", "linux-buildinfo-5.15.0-1056-ibm": "5.15.0-1056.59", "linux-ibm-source-5.15.0": "5.15.0-1056.59", "linux-headers-5.15.0-1056-ibm": "5.15.0-1056.59", "linux-image-unsigned-5.15.0-1056-ibm": "5.15.0-1056.59", "linux-ibm-tools-5.15.0-1056": "5.15.0-1056.59", "linux-ibm-headers-5.15.0-1056": "5.15.0-1056.59", "linux-image-unsigned-5.15.0-1056-ibm-dbgsym": "5.15.0-1056.59", "linux-modules-5.15.0-1056-ibm": "5.15.0-1056.59", "linux-tools-5.15.0-1056-ibm": "5.15.0-1056.59", "linux-ibm-cloud-tools-common": "5.15.0-1056.59" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-intel-iotg-cloud-tools-5.15.0-1058": "5.15.0-1058.64", "linux-cloud-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64", "linux-intel-iotg-tools-host": "5.15.0-1058.64", "linux-modules-extra-5.15.0-1058-intel-iotg": "5.15.0-1058.64", "linux-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64", "linux-modules-5.15.0-1058-intel-iotg": "5.15.0-1058.64", "linux-image-unsigned-5.15.0-1058-intel-iotg-dbgsym": "5.15.0-1058.64", "linux-intel-iotg-cloud-tools-common": "5.15.0-1058.64", "linux-buildinfo-5.15.0-1058-intel-iotg": "5.15.0-1058.64", "linux-intel-iotg-tools-common": "5.15.0-1058.64", "linux-modules-iwlwifi-5.15.0-1058-intel-iotg": "5.15.0-1058.64", "linux-intel-iotg-headers-5.15.0-1058": "5.15.0-1058.64", "linux-intel-iotg-tools-5.15.0-1058": "5.15.0-1058.64", "linux-image-unsigned-5.15.0-1058-intel-iotg": "5.15.0-1058.64", "linux-headers-5.15.0-1058-intel-iotg": "5.15.0-1058.64" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-5.15.0-1060-kvm": "5.15.0-1060.65", "linux-modules-5.15.0-1060-kvm": "5.15.0-1060.65", "linux-image-unsigned-5.15.0-1060-kvm-dbgsym": "5.15.0-1060.65", "linux-tools-5.15.0-1060-kvm": "5.15.0-1060.65", "linux-kvm-headers-5.15.0-1060": "5.15.0-1060.65", "linux-kvm-tools-5.15.0-1060": "5.15.0-1060.65", "linux-headers-5.15.0-1060-kvm": "5.15.0-1060.65", "linux-image-unsigned-5.15.0-1060-kvm": "5.15.0-1060.65" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-5.15.0-110-lowlatency-64k": "5.15.0-110.120", "linux-lowlatency-tools-common": "5.15.0-110.120", "linux-buildinfo-5.15.0-110-lowlatency-64k": "5.15.0-110.120", "linux-image-unsigned-5.15.0-110-lowlatency-64k": "5.15.0-110.120", "linux-headers-5.15.0-110-lowlatency": "5.15.0-110.120", "linux-lowlatency-tools-host": "5.15.0-110.120", "linux-image-unsigned-5.15.0-110-lowlatency": "5.15.0-110.120", "linux-cloud-tools-5.15.0-110-lowlatency": "5.15.0-110.120", "linux-lowlatency-cloud-tools-common": "5.15.0-110.120", "linux-lowlatency-cloud-tools-5.15.0-110": "5.15.0-110.120", "linux-modules-5.15.0-110-lowlatency": "5.15.0-110.120", "linux-modules-iwlwifi-5.15.0-110-lowlatency": "5.15.0-110.120", "linux-image-unsigned-5.15.0-110-lowlatency-dbgsym": "5.15.0-110.120", "linux-lowlatency-tools-5.15.0-110": "5.15.0-110.120", "linux-tools-5.15.0-110-lowlatency": "5.15.0-110.120", "linux-buildinfo-5.15.0-110-lowlatency": "5.15.0-110.120", "linux-lowlatency-headers-5.15.0-110": "5.15.0-110.120", "linux-image-unsigned-5.15.0-110-lowlatency-64k-dbgsym": "5.15.0-110.120", "linux-headers-5.15.0-110-lowlatency-64k": "5.15.0-110.120", "linux-tools-5.15.0-110-lowlatency-64k": "5.15.0-110.120" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-lowlatency-hwe-6.5-cloud-tools-common": "6.5.0-44.44.1~22.04.1", "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-image-unsigned-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-tools-6.5.0-44-lowlatency-64k": "6.5.0-44.44.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-host": "6.5.0-44.44.1~22.04.1", "linux-image-unsigned-6.5.0-44-lowlatency-dbgsym": "6.5.0-44.44.1~22.04.1", "linux-buildinfo-6.5.0-44-lowlatency-64k": "6.5.0-44.44.1~22.04.1", "linux-modules-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-cloud-tools-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-headers-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-buildinfo-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-image-unsigned-6.5.0-44-lowlatency-64k-dbgsym": "6.5.0-44.44.1~22.04.1", "linux-modules-iwlwifi-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-tools-6.5.0-44-lowlatency": "6.5.0-44.44.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-6.5.0-44": "6.5.0-44.44.1~22.04.1", "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-44": "6.5.0-44.44.1~22.04.1", "linux-headers-6.5.0-44-lowlatency-64k": "6.5.0-44.44.1~22.04.1", "linux-lowlatency-hwe-6.5-headers-6.5.0-44": "6.5.0-44.44.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-common": "6.5.0-44.44.1~22.04.1", "linux-modules-6.5.0-44-lowlatency-64k": "6.5.0-44.44.1~22.04.1", "linux-image-unsigned-6.5.0-44-lowlatency-64k": "6.5.0-44.44.1~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-38": "6.8.0-38.38.1~22.04.2", "linux-buildinfo-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-modules-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency-dbgsym": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-headers-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-cloud-tools-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-tools-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-tools-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-modules-iwlwifi-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-buildinfo-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-headers-6.8.0-38": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency-64k-dbgsym": "6.8.0-38.38.1~22.04.2", "linux-image-unsigned-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2", "linux-lowlatency-hwe-6.8-tools-6.8.0-38": "6.8.0-38.38.1~22.04.2", "linux-headers-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59", "linux-nvidia-cloud-tools-common": "5.15.0-1058.59", "linux-modules-extra-5.15.0-1058-nvidia": "5.15.0-1058.59", "linux-modules-nvidia-fs-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59", "linux-nvidia-tools-5.15.0-1058": "5.15.0-1058.59", "linux-nvidia-tools-common": "5.15.0-1058.59", "linux-headers-5.15.0-1058-nvidia": "5.15.0-1058.59", "linux-image-unsigned-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59", "linux-nvidia-headers-5.15.0-1058": "5.15.0-1058.59", "linux-tools-5.15.0-1058-nvidia": "5.15.0-1058.59", "linux-image-unsigned-5.15.0-1058-nvidia-lowlatency-dbgsym": "5.15.0-1058.59", "linux-tools-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59", "linux-buildinfo-5.15.0-1058-nvidia": "5.15.0-1058.59", "linux-image-unsigned-5.15.0-1058-nvidia-dbgsym": "5.15.0-1058.59", "linux-cloud-tools-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59", "linux-headers-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59", "linux-modules-5.15.0-1058-nvidia": "5.15.0-1058.59", "linux-nvidia-cloud-tools-5.15.0-1058": "5.15.0-1058.59", "linux-modules-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59", "linux-modules-nvidia-fs-5.15.0-1058-nvidia": "5.15.0-1058.59", "linux-cloud-tools-5.15.0-1058-nvidia": "5.15.0-1058.59", "linux-nvidia-tools-host": "5.15.0-1058.59", "linux-image-unsigned-5.15.0-1058-nvidia": "5.15.0-1058.59" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-nvidia-6.5-tools-6.5.0-1023": "6.5.0-1023.24", "linux-nvidia-6.5-headers-6.5.0-1023": "6.5.0-1023.24", "linux-modules-6.5.0-1023-nvidia": "6.5.0-1023.24", "linux-image-unsigned-6.5.0-1023-nvidia-64k": "6.5.0-1023.24", "linux-buildinfo-6.5.0-1023-nvidia": "6.5.0-1023.24", "linux-tools-6.5.0-1023-nvidia-64k": "6.5.0-1023.24", "linux-modules-6.5.0-1023-nvidia-64k": "6.5.0-1023.24", "linux-tools-6.5.0-1023-nvidia": "6.5.0-1023.24", "linux-image-unsigned-6.5.0-1023-nvidia-64k-dbgsym": "6.5.0-1023.24", "linux-buildinfo-6.5.0-1023-nvidia-64k": "6.5.0-1023.24", "linux-headers-6.5.0-1023-nvidia-64k": "6.5.0-1023.24", "linux-image-unsigned-6.5.0-1023-nvidia": "6.5.0-1023.24", "linux-nvidia-6.5-tools-host": "6.5.0-1023.24", "linux-modules-nvidia-fs-6.5.0-1023-nvidia-64k": "6.5.0-1023.24", "linux-image-unsigned-6.5.0-1023-nvidia-dbgsym": "6.5.0-1023.24", "linux-modules-extra-6.5.0-1023-nvidia": "6.5.0-1023.24", "linux-headers-6.5.0-1023-nvidia": "6.5.0-1023.24", "linux-modules-nvidia-fs-6.5.0-1023-nvidia": "6.5.0-1023.24" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-tools-6.8.0-1008": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-buildinfo-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-extra-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-modules-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-headers-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-headers-6.8.0-1008": "6.8.0-1008.8~22.04.1", "linux-headers-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-nvidia-fs-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-tools-host": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-dbgsym": "6.8.0-1008.8~22.04.1", "linux-tools-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-tools-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-buildinfo-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-64k-dbgsym": "6.8.0-1008.8~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-ivsc-6.5.0-1027-oem": "6.5.0-1027.28", "linux-modules-usbio-6.5.0-1027-oem": "6.5.0-1027.28", "linux-modules-ipu6-6.5.0-1027-oem": "6.5.0-1027.28", "linux-modules-iwlwifi-6.5.0-1027-oem": "6.5.0-1027.28", "linux-headers-6.5.0-1027-oem": "6.5.0-1027.28", "linux-oem-6.5-lib-rust-6.5.0-1027-oem": "6.5.0-1027.28", "linux-buildinfo-6.5.0-1027-oem": "6.5.0-1027.28", "linux-image-unsigned-6.5.0-1027-oem-dbgsym": "6.5.0-1027.28", "linux-image-unsigned-6.5.0-1027-oem": "6.5.0-1027.28", "linux-modules-6.5.0-1027-oem": "6.5.0-1027.28", "linux-oem-6.5-headers-6.5.0-1027": "6.5.0-1027.28", "linux-oem-6.5-tools-host": "6.5.0-1027.28", "linux-oem-6.5-tools-6.5.0-1027": "6.5.0-1027.28", "linux-tools-6.5.0-1027-oem": "6.5.0-1027.28" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-5.15.0-1061-oracle-dbgsym": "5.15.0-1061.67", "linux-oracle-tools-5.15.0-1061": "5.15.0-1061.67", "linux-modules-extra-5.15.0-1061-oracle": "5.15.0-1061.67", "linux-buildinfo-5.15.0-1061-oracle": "5.15.0-1061.67", "linux-headers-5.15.0-1061-oracle": "5.15.0-1061.67", "linux-modules-5.15.0-1061-oracle": "5.15.0-1061.67", "linux-tools-5.15.0-1061-oracle": "5.15.0-1061.67", "linux-oracle-headers-5.15.0-1061": "5.15.0-1061.67", "linux-image-unsigned-5.15.0-1061-oracle": "5.15.0-1061.67" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-6.5.0-1026-oracle-64k": "6.5.0-1026.26~22.04.1", "linux-oracle-6.5-headers-6.5.0-1026": "6.5.0-1026.26~22.04.1", "linux-buildinfo-6.5.0-1026-oracle": "6.5.0-1026.26~22.04.1", "linux-modules-6.5.0-1026-oracle": "6.5.0-1026.26~22.04.1", "linux-image-unsigned-6.5.0-1026-oracle": "6.5.0-1026.26~22.04.1", "linux-image-unsigned-6.5.0-1026-oracle-dbgsym": "6.5.0-1026.26~22.04.1", "linux-image-unsigned-6.5.0-1026-oracle-64k": "6.5.0-1026.26~22.04.1", "linux-modules-extra-6.5.0-1026-oracle-64k": "6.5.0-1026.26~22.04.1", "linux-oracle-6.5-tools-6.5.0-1026": "6.5.0-1026.26~22.04.1", "linux-headers-6.5.0-1026-oracle": "6.5.0-1026.26~22.04.1", "linux-buildinfo-6.5.0-1026-oracle-64k": "6.5.0-1026.26~22.04.1", "linux-modules-extra-6.5.0-1026-oracle": "6.5.0-1026.26~22.04.1", "linux-headers-6.5.0-1026-oracle-64k": "6.5.0-1026.26~22.04.1", "linux-image-unsigned-6.5.0-1026-oracle-64k-dbgsym": "6.5.0-1026.26~22.04.1", "linux-tools-6.5.0-1026-oracle": "6.5.0-1026.26~22.04.1", "linux-tools-6.5.0-1026-oracle-64k": "6.5.0-1026.26~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-5.15.0-1058-raspi-dbgsym": "5.15.0-1058.61", "linux-modules-extra-5.15.0-1058-raspi": "5.15.0-1058.61", "linux-tools-5.15.0-1058-raspi": "5.15.0-1058.61", "linux-buildinfo-5.15.0-1058-raspi": "5.15.0-1058.61", "linux-raspi-tools-5.15.0-1058": "5.15.0-1058.61", "linux-image-5.15.0-1058-raspi": "5.15.0-1058.61", "linux-modules-5.15.0-1058-raspi": "5.15.0-1058.61", "linux-headers-5.15.0-1058-raspi": "5.15.0-1058.61", "linux-raspi-headers-5.15.0-1058": "5.15.0-1058.61" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-modules-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-riscv-6.8-tools-6.8.0-38": "6.8.0-38.38.1~22.04.1", "linux-image-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-riscv-6.8-headers-6.8.0-38": "6.8.0-38.38.1~22.04.1", "linux-image-6.8.0-38-generic-dbgsym": "6.8.0-38.38.1~22.04.1", "linux-buildinfo-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1", "linux-tools-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-extra-6.5.0-1017-starfive": "6.5.0-1017.18~22.04.1", "linux-headers-6.5.0-1017-starfive": "6.5.0-1017.18~22.04.1", "linux-starfive-6.5-headers-6.5.0-1017": "6.5.0-1017.18~22.04.1", "linux-tools-6.5.0-1017-starfive": "6.5.0-1017.18~22.04.1", "linux-image-6.5.0-1017-starfive-dbgsym": "6.5.0-1017.18~22.04.1", "linux-modules-6.5.0-1017-starfive": "6.5.0-1017.18~22.04.1", "linux-starfive-6.5-tools-6.5.0-1017": "6.5.0-1017.18~22.04.1", "linux-buildinfo-6.5.0-1017-starfive": "6.5.0-1017.18~22.04.1", "linux-image-6.5.0-1017-starfive": "6.5.0-1017.18~22.04.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34", "linux-xilinx-zynqmp-tools-5.15.0-1030": "5.15.0-1030.34", "linux-xilinx-zynqmp-tools-host": "5.15.0-1030.34", "linux-tools-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34", "linux-image-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34", "linux-xilinx-zynqmp-headers-5.15.0-1030": "5.15.0-1030.34", "linux-headers-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34", "linux-xilinx-zynqmp-tools-common": "5.15.0-1030.34", "linux-modules-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34", "linux-image-5.15.0-1030-xilinx-zynqmp-dbgsym": "5.15.0-1030.34" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-6.8.0-11-generic": "6.8.0-11.11", "linux-tools-host": "6.8.0-11.11", "linux-modules-extra-6.8.0-11-generic": "6.8.0-11.11", "linux-cloud-tools-common": "6.8.0-11.11", "linux-image-6.8.0-11-generic-dbgsym": "6.8.0-11.11", "linux-libc-dev": "6.8.0-11.11", "linux-source-6.8.0": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic-64k-dbgsym": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-headers-6.8.0-11": "6.8.0-11.11", "linux-cloud-tools-6.8.0-11-generic": "6.8.0-11.11", "linux-modules-iwlwifi-6.8.0-11-generic": "6.8.0-11.11", "linux-modules-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-tools-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-cloud-tools-6.8.0-11": "6.8.0-11.11", "linux-buildinfo-6.8.0-11-generic": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic": "6.8.0-11.11", "linux-image-6.8.0-11-generic": "6.8.0-11.11", "linux-tools-common": "6.8.0-11.11", "linux-lib-rust-6.8.0-11-generic": "6.8.0-11.11", "linux-tools-6.8.0-11": "6.8.0-11.11", "linux-tools-6.8.0-11-generic": "6.8.0-11.11", "linux-image-unsigned-6.8.0-11-generic-dbgsym": "6.8.0-11.11", "linux-buildinfo-6.8.0-11-generic-64k": "6.8.0-11.11", "linux-modules-6.8.0-11-generic": "6.8.0-11.11", "linux-headers-6.8.0-11-generic-64k": "6.8.0-11.11" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-tools-6.8.0-1006-aws": "6.8.0-1006.6", "linux-modules-6.8.0-1006-aws": "6.8.0-1006.6", "linux-aws-cloud-tools-6.8.0-1006": "6.8.0-1006.6", "linux-buildinfo-6.8.0-1006-aws": "6.8.0-1006.6", "linux-cloud-tools-6.8.0-1006-aws": "6.8.0-1006.6", "linux-headers-6.8.0-1006-aws": "6.8.0-1006.6", "linux-modules-extra-6.8.0-1006-aws": "6.8.0-1006.6", "linux-image-unsigned-6.8.0-1006-aws": "6.8.0-1006.6", "linux-aws-headers-6.8.0-1006": "6.8.0-1006.6", "linux-image-unsigned-6.8.0-1006-aws-dbgsym": "6.8.0-1006.6", "linux-aws-tools-6.8.0-1006": "6.8.0-1006.6" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-unsigned-6.8.0-1001-azure": "6.8.0-1001.1", "linux-azure-tools-6.8.0-1001": "6.8.0-1001.1", "linux-modules-extra-6.8.0-1001-azure": "6.8.0-1001.1", "linux-image-unsigned-6.8.0-1001-azure-dbgsym": "6.8.0-1001.1", "linux-cloud-tools-6.8.0-1001-azure": "6.8.0-1001.1", "linux-azure-headers-6.8.0-1001": "6.8.0-1001.1", "linux-buildinfo-6.8.0-1001-azure": "6.8.0-1001.1", "linux-modules-6.8.0-1001-azure": "6.8.0-1001.1", "linux-headers-6.8.0-1001-azure": "6.8.0-1001.1", "linux-modules-iwlwifi-6.8.0-1001-azure": "6.8.0-1001.1", "linux-azure-cloud-tools-6.8.0-1001": "6.8.0-1001.1", "linux-tools-6.8.0-1001-azure": "6.8.0-1001.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-gcp-tools-6.8.0-1002": "6.8.0-1002.2", "linux-image-unsigned-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-image-unsigned-6.8.0-1002-gcp-dbgsym": "6.8.0-1002.2", "linux-modules-extra-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-buildinfo-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-gcp-headers-6.8.0-1002": "6.8.0-1002.2", "linux-tools-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-headers-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-modules-iwlwifi-6.8.0-1002-gcp": "6.8.0-1002.2", "linux-modules-6.8.0-1002-gcp": "6.8.0-1002.2" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-6.8.0-1003-gke": "6.8.0-1003.5", "linux-gke-tools-6.8.0-1003": "6.8.0-1003.5", "linux-modules-extra-6.8.0-1003-gke": "6.8.0-1003.5", "linux-image-unsigned-6.8.0-1003-gke-dbgsym": "6.8.0-1003.5", "linux-headers-6.8.0-1003-gke": "6.8.0-1003.5", "linux-tools-6.8.0-1003-gke": "6.8.0-1003.5", "linux-gke-headers-6.8.0-1003": "6.8.0-1003.5", "linux-modules-6.8.0-1003-gke": "6.8.0-1003.5", "linux-image-unsigned-6.8.0-1003-gke": "6.8.0-1003.5" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-headers-6.8.0-1003-ibm": "6.8.0-1003.3", "linux-ibm-tools-common": "6.8.0-1003.3", "linux-ibm-headers-6.8.0-1003": "6.8.0-1003.3", "linux-modules-extra-6.8.0-1003-ibm": "6.8.0-1003.3", "linux-ibm-source-6.8.0": "6.8.0-1003.3", "linux-tools-6.8.0-1003-ibm": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-ibm-dbgsym": "6.8.0-1003.3", "linux-ibm-tools-6.8.0-1003": "6.8.0-1003.3", "linux-modules-6.8.0-1003-ibm": "6.8.0-1003.3", "linux-modules-iwlwifi-6.8.0-1003-ibm": "6.8.0-1003.3", "linux-buildinfo-6.8.0-1003-ibm": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-ibm": "6.8.0-1003.3", "linux-ibm-cloud-tools-common": "6.8.0-1003.3" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-tools-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3", "linux-modules-6.8.0-25-lowlatency": "6.8.0-25.25.3", "linux-headers-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3", "linux-lowlatency-tools-common": "6.8.0-25.25.3", "linux-buildinfo-6.8.0-25-lowlatency": "6.8.0-25.25.3", "linux-image-unsigned-6.8.0-25-lowlatency": "6.8.0-25.25.3", "linux-lowlatency-lib-rust-6.8.0-25-lowlatency": "6.8.0-25.25.3", "linux-lowlatency-cloud-tools-6.8.0-25": "6.8.0-25.25.3", "linux-lowlatency-cloud-tools-common": "6.8.0-25.25.3", "linux-lowlatency-tools-host": "6.8.0-25.25.3", "linux-headers-6.8.0-25-lowlatency": "6.8.0-25.25.3", "linux-lowlatency-tools-6.8.0-25": "6.8.0-25.25.3", "linux-cloud-tools-6.8.0-25-lowlatency": "6.8.0-25.25.3", "linux-modules-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3", "linux-tools-6.8.0-25-lowlatency": "6.8.0-25.25.3", "linux-image-unsigned-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3", "linux-lowlatency-headers-6.8.0-25": "6.8.0-25.25.3", "linux-image-unsigned-6.8.0-25-lowlatency-64k-dbgsym": "6.8.0-25.25.3", "linux-image-unsigned-6.8.0-25-lowlatency-dbgsym": "6.8.0-25.25.3", "linux-buildinfo-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3", "linux-modules-iwlwifi-6.8.0-25-lowlatency": "6.8.0-25.25.3" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-nvidia-fs-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-headers-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-dbgsym": "6.8.0-1007.7", "linux-buildinfo-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-modules-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-tools-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-tools-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-64k-dbgsym": "6.8.0-1007.7", "linux-headers-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-modules-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-buildinfo-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-nvidia-tools-6.8.0-1007": "6.8.0-1007.7", "linux-modules-extra-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-nvidia-headers-6.8.0-1007": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-nvidia-tools-host": "6.8.0-1007.7", "linux-modules-nvidia-fs-6.8.0-1007-nvidia-64k": "6.8.0-1007.7" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-nvidia-lowlatency-tools-host": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-tools-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-dbgsym": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k-dbgsym": "6.8.0-1009.9.1", "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-modules-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-modules-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-headers-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-modules-extra-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-buildinfo-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-buildinfo-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-headers-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-nvidia-lowlatency-tools-6.8.0-1009": "6.8.0-1009.9.1", "linux-tools-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-nvidia-lowlatency-headers-6.8.0-1009": "6.8.0-1009.9.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-modules-ivsc-6.8.0-1003-oem": "6.8.0-1003.3", "linux-oem-6.8-tools-6.8.0-1003": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-oem-dbgsym": "6.8.0-1003.3", "linux-headers-6.8.0-1003-oem": "6.8.0-1003.3", "linux-oem-6.8-headers-6.8.0-1003": "6.8.0-1003.3", "linux-tools-6.8.0-1003-oem": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-ipu6-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-iwlwifi-6.8.0-1003-oem": "6.8.0-1003.3", "linux-buildinfo-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-6.8.0-1003-oem": "6.8.0-1003.3" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-6.8.0-1004-oracle": "6.8.0-1004.4", "linux-tools-6.8.0-1004-oracle": "6.8.0-1004.4", "linux-image-unsigned-6.8.0-1004-oracle-dbgsym": "6.8.0-1004.4", "linux-image-unsigned-6.8.0-1004-oracle-64k-dbgsym": "6.8.0-1004.4", "linux-buildinfo-6.8.0-1004-oracle-64k": "6.8.0-1004.4", "linux-image-unsigned-6.8.0-1004-oracle": "6.8.0-1004.4", "linux-headers-6.8.0-1004-oracle-64k": "6.8.0-1004.4", "linux-modules-extra-6.8.0-1004-oracle": "6.8.0-1004.4", "linux-oracle-tools-6.8.0-1004": "6.8.0-1004.4", "linux-tools-6.8.0-1004-oracle-64k": "6.8.0-1004.4", "linux-modules-6.8.0-1004-oracle": "6.8.0-1004.4", "linux-modules-6.8.0-1004-oracle-64k": "6.8.0-1004.4", "linux-modules-extra-6.8.0-1004-oracle-64k": "6.8.0-1004.4", "linux-modules-iwlwifi-6.8.0-1004-oracle": "6.8.0-1004.4", "linux-headers-6.8.0-1004-oracle": "6.8.0-1004.4", "linux-oracle-headers-6.8.0-1004": "6.8.0-1004.4", "linux-image-unsigned-6.8.0-1004-oracle-64k": "6.8.0-1004.4" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-image-6.8.0-1001-raspi-dbgsym": "6.8.0-1001.1", "linux-image-6.8.0-1001-raspi": "6.8.0-1001.1", "linux-raspi-headers-6.8.0-1001": "6.8.0-1001.1", "linux-modules-6.8.0-1001-raspi": "6.8.0-1001.1", "linux-buildinfo-6.8.0-1001-raspi": "6.8.0-1001.1", "linux-headers-6.8.0-1001-raspi": "6.8.0-1001.1", "linux-tools-6.8.0-1001-raspi": "6.8.0-1001.1", "linux-raspi-tools-6.8.0-1001": "6.8.0-1001.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "linux-buildinfo-6.8.0-20-generic": "6.8.0-20.20.1", "linux-riscv-headers-6.8.0-20": "6.8.0-20.20.1", "linux-image-6.8.0-20-generic": "6.8.0-20.20.1", "linux-modules-6.8.0-20-generic": "6.8.0-20.20.1", "linux-riscv-tools-6.8.0-20": "6.8.0-20.20.1", "linux-tools-6.8.0-20-generic": "6.8.0-20.20.1", "linux-image-6.8.0-20-generic-dbgsym": "6.8.0-20.20.1", "linux-headers-6.8.0-20-generic": "6.8.0-20.20.1" } ], "priority_reason": "In order to exploit this, the attacker needs CAP_SYS_ADMIN in the initial namespace." }