UBUNTU-CVE-2024-26583

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2024-26583
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26583.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-26583
Related
Published
2024-02-21T15:15:00Z
Modified
2024-02-21T15:15:00Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one which called recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete() so any code past that point risks touching already freed data. Try to avoid the locking and extra flags altogether. Have the main thread hold an extra reference, this way we can depend solely on the atomic ref counter for synchronization. Don't futz with reiniting the completion, either, we are now tightly controlling when completion fires.

References

Affected packages

Ubuntu:Pro:16.04:LTS / linux-hwe-edge

Package

Name
linux-hwe-edge

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.8.0-28.30~16.04.1
4.8.0-30.32~16.04.1
4.8.0-32.34~16.04.1
4.8.0-34.36~16.04.1
4.10.0-14.16~16.04.1
4.10.0-19.21~16.04.1
4.10.0-20.22~16.04.1
4.10.0-21.23~16.04.1
4.10.0-22.24~16.04.1
4.10.0-24.28~16.04.1
4.10.0-26.30~16.04.1
4.11.0-13.19~16.04.1
4.11.0-14.20~16.04.1
4.13.0-16.19~16.04.3
4.13.0-17.20~16.04.1
4.13.0-19.22~16.04.1
4.13.0-21.24~16.04.1
4.13.0-25.29~16.04.2
4.15.0-13.14~16.04.1
4.15.0-15.16~16.04.1
4.15.0-20.21~16.04.1
4.15.0-22.24~16.04.1
4.15.0-23.25~16.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-aws-5.0

Package

Name
linux-aws-5.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-1021.24~18.04.1
5.0.0-1022.25~18.04.1
5.0.0-1023.26~18.04.1
5.0.0-1024.27~18.04.1
5.0.0-1025.28
5.0.0-1027.30

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-aws-5.3

Package

Name
linux-aws-5.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1016.17~18.04.1
5.3.0-1017.18~18.04.1
5.3.0-1019.21~18.04.1
5.3.0-1023.25~18.04.1
5.3.0-1028.30~18.04.1
5.3.0-1030.32~18.04.1
5.3.0-1032.34~18.04.2
5.3.0-1033.35
5.3.0-1034.36
5.3.0-1035.37

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-aws-5.4

Package

Name
linux-aws-5.4
Purl
pkg:deb/ubuntu/linux-aws-5.4@5.4.0-1129.139~18.04.1?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1129.139~18.04.1

Affected versions

5.*

5.4.0-1018.18~18.04.1
5.4.0-1020.20~18.04.2
5.4.0-1022.22~18.04.1
5.4.0-1024.24~18.04.1
5.4.0-1025.25~18.04.1
5.4.0-1028.29~18.04.1
5.4.0-1029.30~18.04.1
5.4.0-1030.31~18.04.1
5.4.0-1032.33~18.04.1
5.4.0-1034.35~18.04.1
5.4.0-1035.37~18.04.1
5.4.0-1037.39~18.04.1
5.4.0-1038.40~18.04.1
5.4.0-1039.41~18.04.1
5.4.0-1041.43~18.04.1
5.4.0-1043.45~18.04.1
5.4.0-1045.47~18.04.1
5.4.0-1047.49~18.04.1
5.4.0-1048.50~18.04.1
5.4.0-1049.51~18.04.1
5.4.0-1051.53~18.04.1
5.4.0-1054.57~18.04.1
5.4.0-1055.58~18.04.1
5.4.0-1056.59~18.04.1
5.4.0-1057.60~18.04.1
5.4.0-1058.61~18.04.3
5.4.0-1059.62~18.04.1
5.4.0-1060.63~18.04.1
5.4.0-1061.64~18.04.1
5.4.0-1063.66~18.04.1
5.4.0-1064.67~18.04.1
5.4.0-1065.68~18.04.1
5.4.0-1066.69~18.04.1
5.4.0-1068.72~18.04.1
5.4.0-1069.73~18.04.1
5.4.0-1071.76~18.04.1
5.4.0-1072.77~18.04.1
5.4.0-1075.80~18.04.1
5.4.0-1078.84~18.04.1
5.4.0-1080.87~18.04.1
5.4.0-1081.88~18.04.1
5.4.0-1083.90~18.04.1
5.4.0-1084.91~18.04.1
5.4.0-1085.92~18.04.1
5.4.0-1086.93~18.04.1
5.4.0-1088.96~18.04.1
5.4.0-1089.97~18.04.1
5.4.0-1090.98~18.04.1
5.4.0-1092.100~18.04.2
5.4.0-1093.102~18.04.2
5.4.0-1094.102~18.04.1
5.4.0-1096.104~18.04.1
5.4.0-1097.105~18.04.1
5.4.0-1099.107~18.04.1
5.4.0-1100.108~18.04.1
5.4.0-1101.109~18.04.1
5.4.0-1103.111~18.04.1
5.4.0-1104.112~18.04.1
5.4.0-1105.113~18.04.1
5.4.0-1106.114~18.04.1
5.4.0-1107.115~18.04.1
5.4.0-1108.116~18.04.1
5.4.0-1109.118~18.04.1
5.4.0-1110.119~18.04.1
5.4.0-1111.120~18.04.1
5.4.0-1112.121~18.04.2
5.4.0-1113.123~18.04.1
5.4.0-1114.124~18.04.1
5.4.0-1116.126~18.04.1
5.4.0-1117.127~18.04.1
5.4.0-1118.128~18.04.1
5.4.0-1119.129~18.04.1
5.4.0-1120.130~18.04.1
5.4.0-1121.131~18.04.1
5.4.0-1122.132~18.04.1
5.4.0-1123.133~18.04.1
5.4.0-1124.134~18.04.1
5.4.0-1125.135~18.04.1
5.4.0-1126.136~18.04.1
5.4.0-1127.137~18.04.2
5.4.0-1128.138~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-aws-5.4-tools-5.4.0-1129": "5.4.0-1129.139~18.04.1",
            "linux-tools-5.4.0-1129-aws": "5.4.0-1129.139~18.04.1",
            "linux-buildinfo-5.4.0-1129-aws": "5.4.0-1129.139~18.04.1",
            "linux-image-unsigned-5.4.0-1129-aws-dbgsym": "5.4.0-1129.139~18.04.1",
            "linux-image-unsigned-5.4.0-1129-aws": "5.4.0-1129.139~18.04.1",
            "linux-aws-5.4-headers-5.4.0-1129": "5.4.0-1129.139~18.04.1",
            "linux-aws-5.4-cloud-tools-5.4.0-1129": "5.4.0-1129.139~18.04.1",
            "linux-modules-extra-5.4.0-1129-aws": "5.4.0-1129.139~18.04.1",
            "linux-modules-5.4.0-1129-aws": "5.4.0-1129.139~18.04.1",
            "linux-headers-5.4.0-1129-aws": "5.4.0-1129.139~18.04.1",
            "linux-cloud-tools-5.4.0-1129-aws": "5.4.0-1129.139~18.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-azure

Package

Name
linux-azure

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1002.2
4.15.0-1003.3
4.15.0-1004.4
4.15.0-1008.8
4.15.0-1009.9
4.15.0-1012.12
4.15.0-1013.13
4.15.0-1014.14
4.15.0-1018.18
4.15.0-1019.19
4.15.0-1021.21
4.15.0-1022.23
4.15.0-1023.24
4.15.0-1025.26
4.15.0-1028.29
4.15.0-1030.31
4.15.0-1031.32
4.15.0-1032.33
4.15.0-1035.36
4.15.0-1036.38
4.15.0-1037.39
4.18.0-1011.11~18.04.1
4.18.0-1013.13~18.04.1
4.18.0-1014.14~18.04.1
4.18.0-1018.18~18.04.1
4.18.0-1019.19~18.04.1
4.18.0-1020.20~18.04.1
4.18.0-1023.24~18.04.1
4.18.0-1024.25~18.04.1
4.18.0-1025.27~18.04.1

5.*

5.0.0-1014.14~18.04.1
5.0.0-1016.17~18.04.1
5.0.0-1018.19~18.04.1
5.0.0-1020.21~18.04.1
5.0.0-1022.23~18.04.1
5.0.0-1023.24~18.04.1
5.0.0-1025.27~18.04.1
5.0.0-1027.29~18.04.1
5.0.0-1028.30~18.04.1
5.0.0-1029.31~18.04.1
5.0.0-1031.33
5.0.0-1032.34
5.0.0-1035.37
5.0.0-1036.38

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-azure-5.3

Package

Name
linux-azure-5.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1007.8~18.04.1
5.3.0-1008.9~18.04.1
5.3.0-1009.10~18.04.1
5.3.0-1010.11~18.04.1
5.3.0-1012.13~18.04.1
5.3.0-1013.14~18.04.1
5.3.0-1016.17~18.04.1
5.3.0-1018.19~18.04.1
5.3.0-1019.20~18.04.1
5.3.0-1020.21~18.04.1
5.3.0-1022.23~18.04.1
5.3.0-1028.29~18.04.1
5.3.0-1031.32~18.04.1
5.3.0-1032.33~18.04.1
5.3.0-1034.35~18.04.1
5.3.0-1035.36

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-azure-5.4

Package

Name
linux-azure-5.4
Purl
pkg:deb/ubuntu/linux-azure-5.4@5.4.0-1134.141~18.04.1?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1134.141~18.04.1

Affected versions

5.*

5.4.0-1020.20~18.04.1
5.4.0-1022.22~18.04.1
5.4.0-1023.23~18.04.1
5.4.0-1025.25~18.04.1
5.4.0-1026.26~18.04.1
5.4.0-1031.32~18.04.1
5.4.0-1032.33~18.04.1
5.4.0-1034.35~18.04.1
5.4.0-1035.36~18.04.1
5.4.0-1036.38~18.04.1
5.4.0-1039.41~18.04.1
5.4.0-1040.42~18.04.1
5.4.0-1041.43~18.04.1
5.4.0-1043.45~18.04.1
5.4.0-1044.46~18.04.1
5.4.0-1046.48~18.04.1
5.4.0-1047.49~18.04.1
5.4.0-1048.50~18.04.1
5.4.0-1049.51~18.04.1
5.4.0-1051.53~18.04.1
5.4.0-1055.57~18.04.1
5.4.0-1056.58~18.04.1
5.4.0-1058.60~18.04.1
5.4.0-1059.62~18.04.1
5.4.0-1061.64~18.04.1
5.4.0-1062.65~18.04.1
5.4.0-1063.66~18.04.1
5.4.0-1064.67~18.04.1
5.4.0-1065.68~18.04.1
5.4.0-1067.70~18.04.1
5.4.0-1068.71~18.04.1
5.4.0-1069.72~18.04.1
5.4.0-1070.73~18.04.1
5.4.0-1072.75~18.04.1
5.4.0-1073.76~18.04.1
5.4.0-1074.77~18.04.1
5.4.0-1077.80~18.04.1
5.4.0-1078.81~18.04.1
5.4.0-1080.83~18.04.2
5.4.0-1083.87~18.04.1
5.4.0-1085.90~18.04.1
5.4.0-1086.91~18.04.1
5.4.0-1089.94~18.04.1
5.4.0-1090.95~18.04.1
5.4.0-1091.96~18.04.1
5.4.0-1094.100~18.04.1
5.4.0-1095.101~18.04.1
5.4.0-1098.104~18.04.2
5.4.0-1100.106~18.04.1
5.4.0-1101.107~18.04.1
5.4.0-1103.109~18.04.1
5.4.0-1104.110~18.04.1
5.4.0-1105.111~18.04.1
5.4.0-1106.112~18.04.1
5.4.0-1107.113~18.04.1
5.4.0-1108.114~18.04.1
5.4.0-1109.115~18.04.1
5.4.0-1110.116~18.04.1
5.4.0-1111.117~18.04.1
5.4.0-1112.118~18.04.1
5.4.0-1113.119~18.04.1
5.4.0-1115.122~18.04.1
5.4.0-1116.123~18.04.1
5.4.0-1117.124~18.04.1
5.4.0-1118.125~18.04.1
5.4.0-1119.126~18.04.2
5.4.0-1120.127~18.04.1
5.4.0-1121.128~18.04.1
5.4.0-1122.129~18.04.1
5.4.0-1123.130~18.04.1
5.4.0-1124.131~18.04.1
5.4.0-1126.133~18.04.1
5.4.0-1127.134~18.04.1
5.4.0-1128.135~18.04.1
5.4.0-1129.136~18.04.1
5.4.0-1130.137~18.04.1
5.4.0-1131.138~18.04.1
5.4.0-1132.139~18.04.1
5.4.0-1133.140~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.4.0-1134-azure": "5.4.0-1134.141~18.04.1",
            "linux-cloud-tools-5.4.0-1134-azure": "5.4.0-1134.141~18.04.1",
            "linux-azure-5.4-cloud-tools-5.4.0-1134": "5.4.0-1134.141~18.04.1",
            "linux-azure-5.4-headers-5.4.0-1134": "5.4.0-1134.141~18.04.1",
            "linux-modules-5.4.0-1134-azure": "5.4.0-1134.141~18.04.1",
            "linux-azure-5.4-tools-5.4.0-1134": "5.4.0-1134.141~18.04.1",
            "linux-modules-extra-5.4.0-1134-azure": "5.4.0-1134.141~18.04.1",
            "linux-tools-5.4.0-1134-azure": "5.4.0-1134.141~18.04.1",
            "linux-headers-5.4.0-1134-azure": "5.4.0-1134.141~18.04.1",
            "linux-image-unsigned-5.4.0-1134-azure-dbgsym": "5.4.0-1134.141~18.04.1",
            "linux-buildinfo-5.4.0-1134-azure": "5.4.0-1134.141~18.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-azure-edge

Package

Name
linux-azure-edge

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.18.0-1006.6~18.04.1
4.18.0-1007.7~18.04.1
4.18.0-1008.8~18.04.1

5.*

5.0.0-1012.12~18.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-gcp

Package

Name
linux-gcp

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1001.1
4.15.0-1003.3
4.15.0-1005.5
4.15.0-1006.6
4.15.0-1008.8
4.15.0-1009.9
4.15.0-1010.10
4.15.0-1014.14
4.15.0-1015.15
4.15.0-1017.18
4.15.0-1018.19
4.15.0-1019.20
4.15.0-1021.22
4.15.0-1023.24
4.15.0-1024.25
4.15.0-1025.26
4.15.0-1026.27
4.15.0-1027.28
4.15.0-1028.29
4.15.0-1029.31
4.15.0-1030.32
4.15.0-1032.34
4.15.0-1033.35
4.15.0-1034.36
4.15.0-1036.38
4.15.0-1037.39
4.15.0-1040.42
4.15.0-1042.45
4.15.0-1044.70

5.*

5.0.0-1020.20~18.04.1
5.0.0-1021.21~18.04.1
5.0.0-1025.26~18.04.1
5.0.0-1026.27~18.04.1
5.0.0-1028.29~18.04.1
5.0.0-1029.30~18.04.1
5.0.0-1031.32
5.0.0-1033.34
5.0.0-1034.35

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-gcp-5.3

Package

Name
linux-gcp-5.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1008.9~18.04.1
5.3.0-1009.10~18.04.1
5.3.0-1010.11~18.04.1
5.3.0-1012.13~18.04.1
5.3.0-1014.15~18.04.1
5.3.0-1016.17~18.04.1
5.3.0-1017.18~18.04.1
5.3.0-1018.19~18.04.1
5.3.0-1020.22~18.04.1
5.3.0-1026.28~18.04.1
5.3.0-1029.31~18.04.1
5.3.0-1030.32~18.04.1
5.3.0-1032.34~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-gcp-5.4

Package

Name
linux-gcp-5.4
Purl
pkg:deb/ubuntu/linux-gcp-5.4@5.4.0-1133.142~18.04.1?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1133.142~18.04.1

Affected versions

5.*

5.4.0-1019.19~18.04.2
5.4.0-1021.21~18.04.1
5.4.0-1022.22~18.04.1
5.4.0-1024.24~18.04.1
5.4.0-1025.25~18.04.1
5.4.0-1028.29~18.04.1
5.4.0-1029.31~18.04.1
5.4.0-1030.32~18.04.1
5.4.0-1032.34~18.04.1
5.4.0-1033.35~18.04.1
5.4.0-1034.37~18.04.1
5.4.0-1036.39~18.04.1
5.4.0-1037.40~18.04.1
5.4.0-1038.41~18.04.1
5.4.0-1040.43~18.04.1
5.4.0-1041.44~18.04.1
5.4.0-1042.45~18.04.1
5.4.0-1043.46~18.04.1
5.4.0-1044.47~18.04.2
5.4.0-1046.49~18.04.1
5.4.0-1049.53~18.04.1
5.4.0-1051.55~18.04.1
5.4.0-1052.56~18.04.1
5.4.0-1053.57~18.04.1
5.4.0-1055.59~18.04.1
5.4.0-1056.60~18.04.1
5.4.0-1057.61~18.04.1
5.4.0-1058.62~18.04.1
5.4.0-1059.63~18.04.1
5.4.0-1060.64~18.04.1
5.4.0-1062.66~18.04.1
5.4.0-1063.67~18.04.1
5.4.0-1064.68~18.04.1
5.4.0-1065.69~18.04.1
5.4.0-1067.71~18.04.1
5.4.0-1068.72~18.04.1
5.4.0-1069.73~18.04.1
5.4.0-1072.77~18.04.1
5.4.0-1073.78~18.04.1
5.4.0-1075.80~18.04.1
5.4.0-1078.84~18.04.1
5.4.0-1080.87~18.04.1
5.4.0-1083.91~18.04.1
5.4.0-1084.92~18.04.1
5.4.0-1086.94~18.04.1
5.4.0-1087.95~18.04.1
5.4.0-1089.97~18.04.1
5.4.0-1092.101~18.04.1
5.4.0-1093.102~18.04.1
5.4.0-1096.105~18.04.2
5.4.0-1097.106~18.04.1
5.4.0-1098.107~18.04.1
5.4.0-1100.109~18.04.1
5.4.0-1101.110~18.04.1
5.4.0-1102.111~18.04.2
5.4.0-1103.112~18.04.1
5.4.0-1104.113~18.04.1
5.4.0-1105.114~18.04.1
5.4.0-1106.115~18.04.1
5.4.0-1107.116~18.04.1
5.4.0-1108.117~18.04.1
5.4.0-1109.118~18.04.1
5.4.0-1110.119~18.04.1
5.4.0-1111.120~18.04.1
5.4.0-1112.121~18.04.1
5.4.0-1113.122~18.04.1
5.4.0-1115.124~18.04.1
5.4.0-1116.125~18.04.1
5.4.0-1117.126~18.04.1
5.4.0-1118.127~18.04.1
5.4.0-1120.129~18.04.1
5.4.0-1121.130~18.04.1
5.4.0-1122.131~18.04.1
5.4.0-1123.132~18.04.1
5.4.0-1124.133~18.04.1
5.4.0-1125.134~18.04.1
5.4.0-1126.135~18.04.1
5.4.0-1127.136~18.04.1
5.4.0-1128.137~18.04.1
5.4.0-1129.138~18.04.1
5.4.0-1130.139~18.04.1
5.4.0-1132.141~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-headers-5.4.0-1133-gcp": "5.4.0-1133.142~18.04.1",
            "linux-buildinfo-5.4.0-1133-gcp": "5.4.0-1133.142~18.04.1",
            "linux-modules-extra-5.4.0-1133-gcp": "5.4.0-1133.142~18.04.1",
            "linux-gcp-5.4-headers-5.4.0-1133": "5.4.0-1133.142~18.04.1",
            "linux-image-unsigned-5.4.0-1133-gcp-dbgsym": "5.4.0-1133.142~18.04.1",
            "linux-modules-5.4.0-1133-gcp": "5.4.0-1133.142~18.04.1",
            "linux-tools-5.4.0-1133-gcp": "5.4.0-1133.142~18.04.1",
            "linux-gcp-5.4-tools-5.4.0-1133": "5.4.0-1133.142~18.04.1",
            "linux-image-unsigned-5.4.0-1133-gcp": "5.4.0-1133.142~18.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-gke-4.15

Package

Name
linux-gke-4.15

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1030.32
4.15.0-1032.34
4.15.0-1033.35
4.15.0-1034.36
4.15.0-1036.38
4.15.0-1037.39
4.15.0-1040.42
4.15.0-1041.43
4.15.0-1042.44
4.15.0-1044.46
4.15.0-1045.48
4.15.0-1046.49
4.15.0-1048.51
4.15.0-1049.52
4.15.0-1050.53
4.15.0-1052.55
4.15.0-1055.58
4.15.0-1057.60
4.15.0-1058.61
4.15.0-1059.62
4.15.0-1063.66
4.15.0-1064.67
4.15.0-1066.69
4.15.0-1067.70
4.15.0-1069.72
4.15.0-1070.73
4.15.0-1072.76
4.15.0-1073.78
4.15.0-1074.79
4.15.0-1076.81
4.15.0-1077.82
4.15.0-1078.83
4.15.0-1079.84

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-gke-5.4

Package

Name
linux-gke-5.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1025.25~18.04.1
5.4.0-1027.28~18.04.1
5.4.0-1029.31~18.04.1
5.4.0-1030.32~18.04.1
5.4.0-1032.34~18.04.1
5.4.0-1033.35~18.04.1
5.4.0-1035.37~18.04.1
5.4.0-1036.38~18.04.1
5.4.0-1037.39~18.04.1
5.4.0-1039.41~18.04.1
5.4.0-1040.42~18.04.1
5.4.0-1042.44~18.04.1
5.4.0-1043.45~18.04.1
5.4.0-1044.46~18.04.1
5.4.0-1046.48~18.04.1
5.4.0-1049.52~18.04.1
5.4.0-1051.54~18.04.1
5.4.0-1052.55~18.04.1
5.4.0-1053.56~18.04.1
5.4.0-1054.57~18.04.1
5.4.0-1055.58~18.04.1
5.4.0-1056.59~18.04.1
5.4.0-1057.60~18.04.1
5.4.0-1059.62~18.04.1
5.4.0-1061.64~18.04.1
5.4.0-1062.65~18.04.1
5.4.0-1063.66~18.04.1
5.4.0-1065.68~18.04.1
5.4.0-1066.69~18.04.1
5.4.0-1067.70~18.04.1
5.4.0-1068.71~18.04.1
5.4.0-1071.76~18.04.3
5.4.0-1072.77~18.04.1
5.4.0-1074.79~18.04.1
5.4.0-1076.82~18.04.1
5.4.0-1078.84~18.04.1
5.4.0-1080.86~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-gkeop-5.4

Package

Name
linux-gkeop-5.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1001.1
5.4.0-1003.3
5.4.0-1004.5
5.4.0-1005.6
5.4.0-1007.8~18.04.1
5.4.0-1008.9~18.04.1
5.4.0-1009.10~18.04.1
5.4.0-1010.11~18.04.1
5.4.0-1011.12~18.04.2
5.4.0-1012.13~18.04.1
5.4.0-1013.14~18.04.1
5.4.0-1014.15~18.04.1
5.4.0-1015.16~18.04.1
5.4.0-1016.17~18.04.1
5.4.0-1018.19~18.04.1
5.4.0-1021.22~18.04.1
5.4.0-1022.23~18.04.1
5.4.0-1023.24~18.04.1
5.4.0-1024.25~18.04.1
5.4.0-1025.26~18.04.1
5.4.0-1026.27~18.04.1
5.4.0-1027.28~18.04.1
5.4.0-1029.30~18.04.2
5.4.0-1031.32~18.04.1
5.4.0-1032.33~18.04.1
5.4.0-1033.34~18.04.1
5.4.0-1034.35~18.04.1
5.4.0-1036.37~18.04.1
5.4.0-1037.38~18.04.1
5.4.0-1038.39~18.04.1
5.4.0-1039.40~18.04.1
5.4.0-1040.41~18.04.1
5.4.0-1043.44~18.04.1
5.4.0-1046.48~18.04.1
5.4.0-1048.51~18.04.1
5.4.0-1049.52~18.04.1
5.4.0-1051.54~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-hwe

Package

Name
linux-hwe

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.18.0-13.14~18.04.1
4.18.0-14.15~18.04.1
4.18.0-15.16~18.04.1
4.18.0-16.17~18.04.1
4.18.0-17.18~18.04.1
4.18.0-18.19~18.04.1
4.18.0-20.21~18.04.1
4.18.0-21.22~18.04.1
4.18.0-22.23~18.04.1
4.18.0-24.25~18.04.1
4.18.0-25.26~18.04.1

5.*

5.0.0-23.24~18.04.1
5.0.0-25.26~18.04.1
5.0.0-27.28~18.04.1
5.0.0-29.31~18.04.1
5.0.0-31.33~18.04.1
5.0.0-32.34~18.04.2
5.0.0-35.38~18.04.1
5.0.0-36.39~18.04.1
5.0.0-37.40~18.04.1
5.3.0-26.28~18.04.1
5.3.0-28.30~18.04.1
5.3.0-40.32~18.04.1
5.3.0-42.34~18.04.1
5.3.0-45.37~18.04.1
5.3.0-46.38~18.04.1
5.3.0-51.44~18.04.2
5.3.0-53.47~18.04.1
5.3.0-59.53~18.04.1
5.3.0-61.55~18.04.1
5.3.0-62.56~18.04.1
5.3.0-64.58~18.04.1
5.3.0-65.59
5.3.0-66.60
5.3.0-67.61
5.3.0-68.63
5.3.0-69.65
5.3.0-70.66
5.3.0-72.68
5.3.0-73.69
5.3.0-74.70
5.3.0-75.71
5.3.0-76.72

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-hwe-5.4

Package

Name
linux-hwe-5.4
Purl
pkg:deb/ubuntu/linux-hwe-5.4@5.4.0-190.210~18.04.1?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-190.210~18.04.1

Affected versions

5.*

5.4.0-37.41~18.04.1
5.4.0-39.43~18.04.1
5.4.0-40.44~18.04.1
5.4.0-42.46~18.04.1
5.4.0-45.49~18.04.2
5.4.0-47.51~18.04.1
5.4.0-48.52~18.04.1
5.4.0-51.56~18.04.1
5.4.0-52.57~18.04.1
5.4.0-53.59~18.04.1
5.4.0-54.60~18.04.1
5.4.0-56.62~18.04.1
5.4.0-58.64~18.04.1
5.4.0-59.65~18.04.1
5.4.0-60.67~18.04.1
5.4.0-62.70~18.04.1
5.4.0-64.72~18.04.1
5.4.0-65.73~18.04.1
5.4.0-66.74~18.04.2
5.4.0-67.75~18.04.1
5.4.0-70.78~18.04.1
5.4.0-71.79~18.04.1
5.4.0-72.80~18.04.1
5.4.0-73.82~18.04.1
5.4.0-74.83~18.04.1
5.4.0-77.86~18.04.1
5.4.0-80.90~18.04.1
5.4.0-81.91~18.04.1
5.4.0-84.94~18.04.1
5.4.0-86.97~18.04.1
5.4.0-87.98~18.04.1
5.4.0-89.100~18.04.1
5.4.0-90.101~18.04.1
5.4.0-91.102~18.04.1
5.4.0-92.103~18.04.2
5.4.0-94.106~18.04.1
5.4.0-96.109~18.04.1
5.4.0-97.110~18.04.1
5.4.0-99.112~18.04.1
5.4.0-100.113~18.04.1
5.4.0-104.118~18.04.1
5.4.0-105.119~18.04.1
5.4.0-107.121~18.04.1
5.4.0-109.123~18.04.1
5.4.0-110.124~18.04.1
5.4.0-113.127~18.04.1
5.4.0-117.132~18.04.1
5.4.0-120.136~18.04.1
5.4.0-121.137~18.04.1
5.4.0-122.138~18.04.1
5.4.0-124.140~18.04.1
5.4.0-125.141~18.04.1
5.4.0-126.142~18.04.1
5.4.0-128.144~18.04.1
5.4.0-131.147~18.04.1
5.4.0-132.148~18.04.1
5.4.0-133.149~18.04.1
5.4.0-135.152~18.04.2
5.4.0-136.153~18.04.1
5.4.0-137.154~18.04.1
5.4.0-139.156~18.04.1
5.4.0-144.161~18.04.1
5.4.0-146.163~18.04.1
5.4.0-147.164~18.04.1
5.4.0-148.165~18.04.1
5.4.0-149.166~18.04.1
5.4.0-150.167~18.04.1
5.4.0-152.169~18.04.1
5.4.0-153.170~18.04.1
5.4.0-155.172~18.04.1
5.4.0-156.173~18.04.1
5.4.0-159.176~18.04.1
5.4.0-162.179~18.04.1
5.4.0-163.180~18.04.1
5.4.0-164.181~18.04.1
5.4.0-165.182~18.04.1
5.4.0-166.183~18.04.2
5.4.0-167.184~18.04.1
5.4.0-169.187~18.04.1
5.4.0-170.188~18.04.1
5.4.0-171.189~18.04.1
5.4.0-172.190~18.04.1
5.4.0-173.191~18.04.1
5.4.0-174.193~18.04.1
5.4.0-175.195~18.04.1
5.4.0-177.197~18.04.1
5.4.0-181.201~18.04.1
5.4.0-182.202~18.04.1
5.4.0-186.206~18.04.1
5.4.0-187.207~18.04.1
5.4.0-189.209~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.4.0-190-lowlatency-dbgsym": "5.4.0-190.210~18.04.1",
            "nfs-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "fs-secondary-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-headers-5.4.0-190-generic": "5.4.0-190.210~18.04.1",
            "nic-pcmcia-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "crypto-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "storage-core-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "vlan-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "block-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "nic-shared-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-cloud-tools-5.4.0-190-generic": "5.4.0-190.210~18.04.1",
            "serial-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "scsi-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-buildinfo-5.4.0-190-lowlatency": "5.4.0-190.210~18.04.1",
            "floppy-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-hwe-5.4-tools-5.4.0-190": "5.4.0-190.210~18.04.1",
            "linux-buildinfo-5.4.0-190-generic": "5.4.0-190.210~18.04.1",
            "usb-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-tools-5.4.0-190-lowlatency": "5.4.0-190.210~18.04.1",
            "linux-hwe-5.4-cloud-tools-common": "5.4.0-190.210~18.04.1",
            "pata-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-tools-5.4.0-190-generic": "5.4.0-190.210~18.04.1",
            "linux-hwe-5.4-headers-5.4.0-190": "5.4.0-190.210~18.04.1",
            "nic-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "input-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "fb-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "parport-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "multipath-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "pcmcia-storage-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "firewire-core-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "dasd-extra-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-hwe-5.4-source-5.4.0": "5.4.0-190.210~18.04.1",
            "linux-hwe-5.4-udebs-generic": "5.4.0-190.210~18.04.1",
            "md-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "ppp-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "virtio-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-modules-5.4.0-190-generic": "5.4.0-190.210~18.04.1",
            "ipmi-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-cloud-tools-5.4.0-190-lowlatency": "5.4.0-190.210~18.04.1",
            "message-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "pcmcia-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-modules-extra-5.4.0-190-generic": "5.4.0-190.210~18.04.1",
            "nic-usb-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-modules-5.4.0-190-lowlatency": "5.4.0-190.210~18.04.1",
            "linux-hwe-5.4-cloud-tools-5.4.0-190": "5.4.0-190.210~18.04.1",
            "plip-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-hwe-5.4-tools-common": "5.4.0-190.210~18.04.1",
            "linux-image-unsigned-5.4.0-190-generic-dbgsym": "5.4.0-190.210~18.04.1",
            "linux-image-unsigned-5.4.0-190-generic": "5.4.0-190.210~18.04.1",
            "fat-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "kernel-image-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "fs-core-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "linux-headers-5.4.0-190-lowlatency": "5.4.0-190.210~18.04.1",
            "linux-image-unsigned-5.4.0-190-lowlatency": "5.4.0-190.210~18.04.1",
            "mouse-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "sata-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1",
            "dasd-modules-5.4.0-190-generic-di": "5.4.0-190.210~18.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-hwe-edge

Package

Name
linux-hwe-edge

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-15.16~18.04.1
5.0.0-16.17~18.04.1
5.0.0-17.18~18.04.1
5.0.0-19.20~18.04.1
5.0.0-20.21~18.04.1
5.3.0-19.20~18.04.2
5.3.0-22.24~18.04.1
5.3.0-23.25~18.04.1
5.3.0-23.25~18.04.2
5.3.0-24.26~18.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-ibm-5.4

Package

Name
linux-ibm-5.4
Purl
pkg:deb/ubuntu/linux-ibm-5.4@5.4.0-1076.81~18.04.1?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1076.81~18.04.1

Affected versions

5.*

5.4.0-1010.11~18.04.2
5.4.0-1012.13~18.04.1
5.4.0-1014.15~18.04.1
5.4.0-1015.16~18.04.1
5.4.0-1017.19~18.04.1
5.4.0-1018.20~18.04.1
5.4.0-1019.21~18.04.1
5.4.0-1020.22~18.04.1
5.4.0-1021.23~18.04.1
5.4.0-1023.25~18.04.1
5.4.0-1026.29~18.04.1
5.4.0-1028.32~18.04.1
5.4.0-1029.33~18.04.1
5.4.0-1031.35~18.04.1
5.4.0-1032.36~18.04.1
5.4.0-1033.37~18.04.1
5.4.0-1034.38~18.04.1
5.4.0-1036.41~18.04.1
5.4.0-1037.42~18.04.1
5.4.0-1040.45~18.04.2
5.4.0-1041.46~18.04.1
5.4.0-1042.47~18.04.1
5.4.0-1044.49~18.04.1
5.4.0-1045.50~18.04.1
5.4.0-1046.51~18.04.1
5.4.0-1047.52~18.04.1
5.4.0-1048.53~18.04.1
5.4.0-1049.54~18.04.1
5.4.0-1050.55~18.04.1
5.4.0-1051.56~18.04.1
5.4.0-1052.57~18.04.1
5.4.0-1053.58~18.04.1
5.4.0-1054.59~18.04.1
5.4.0-1056.61~18.04.1
5.4.0-1057.62~18.04.1
5.4.0-1058.63~18.04.1
5.4.0-1059.64~18.04.1
5.4.0-1060.65~18.04.1
5.4.0-1061.66~18.04.1
5.4.0-1063.68~18.04.1
5.4.0-1064.69~18.04.1
5.4.0-1065.70~18.04.1
5.4.0-1066.71~18.04.1
5.4.0-1067.72~18.04.1
5.4.0-1068.73~18.04.1
5.4.0-1069.74~18.04.1
5.4.0-1070.75~18.04.1
5.4.0-1071.76~18.04.1
5.4.0-1072.77~18.04.1
5.4.0-1073.78~18.04.1
5.4.0-1074.79~18.04.1
5.4.0-1075.80~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-tools-5.4.0-1076-ibm": "5.4.0-1076.81~18.04.1",
            "linux-image-unsigned-5.4.0-1076-ibm": "5.4.0-1076.81~18.04.1",
            "linux-modules-5.4.0-1076-ibm": "5.4.0-1076.81~18.04.1",
            "linux-ibm-5.4-headers-5.4.0-1076": "5.4.0-1076.81~18.04.1",
            "linux-ibm-5.4-cloud-tools-common": "5.4.0-1076.81~18.04.1",
            "linux-image-unsigned-5.4.0-1076-ibm-dbgsym": "5.4.0-1076.81~18.04.1",
            "linux-ibm-5.4-tools-5.4.0-1076": "5.4.0-1076.81~18.04.1",
            "linux-buildinfo-5.4.0-1076-ibm": "5.4.0-1076.81~18.04.1",
            "linux-headers-5.4.0-1076-ibm": "5.4.0-1076.81~18.04.1",
            "linux-ibm-5.4-tools-common": "5.4.0-1076.81~18.04.1",
            "linux-modules-extra-5.4.0-1076-ibm": "5.4.0-1076.81~18.04.1",
            "linux-ibm-5.4-source-5.4.0": "5.4.0-1076.81~18.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-oem

Package

Name
linux-oem

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1002.3
4.15.0-1004.5
4.15.0-1006.9
4.15.0-1008.11
4.15.0-1009.12
4.15.0-1012.15
4.15.0-1013.16
4.15.0-1015.18
4.15.0-1017.20
4.15.0-1018.21
4.15.0-1021.24
4.15.0-1024.29
4.15.0-1026.31
4.15.0-1028.33
4.15.0-1030.35
4.15.0-1033.38
4.15.0-1034.39
4.15.0-1035.40
4.15.0-1036.41
4.15.0-1038.43
4.15.0-1039.44
4.15.0-1043.48
4.15.0-1045.50
4.15.0-1050.57
4.15.0-1056.65
4.15.0-1057.66
4.15.0-1059.68
4.15.0-1063.72
4.15.0-1064.73
4.15.0-1065.75
4.15.0-1066.76
4.15.0-1067.77
4.15.0-1069.79
4.15.0-1073.83
4.15.0-1076.86
4.15.0-1079.89
4.15.0-1080.90
4.15.0-1081.91
4.15.0-1087.97
4.15.0-1090.100
4.15.0-1091.101
4.15.0-1093.103
4.15.0-1094.104
4.15.0-1096.106
4.15.0-1097.107
4.15.0-1099.109
4.15.0-1100.110
4.15.0-1101.112
4.15.0-1102.113
4.15.0-1103.114

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-oracle-5.0

Package

Name
linux-oracle-5.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-1007.12~18.04.1
5.0.0-1008.13~18.04.1
5.0.0-1009.14~18.04.1
5.0.0-1010.15~18.04.1
5.0.0-1011.16
5.0.0-1013.18
5.0.0-1014.19

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-oracle-5.3

Package

Name
linux-oracle-5.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1011.12~18.04.1
5.3.0-1013.14~18.04.1
5.3.0-1014.15~18.04.1
5.3.0-1016.18~18.04.1
5.3.0-1018.20~18.04.1
5.3.0-1024.26~18.04.1
5.3.0-1027.29~18.04.1
5.3.0-1028.30~18.04.1
5.3.0-1030.32~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-oracle-5.4

Package

Name
linux-oracle-5.4
Purl
pkg:deb/ubuntu/linux-oracle-5.4@5.4.0-1129.138~18.04.1?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1129.138~18.04.1

Affected versions

5.*

5.4.0-1019.19~18.04.1
5.4.0-1021.21~18.04.1
5.4.0-1022.22~18.04.1
5.4.0-1024.24~18.04.1
5.4.0-1025.25~18.04.1
5.4.0-1028.29~18.04.1
5.4.0-1029.31~18.04.1
5.4.0-1030.32~18.04.1
5.4.0-1033.35
5.4.0-1034.36~18.04.1
5.4.0-1035.38~18.04.1
5.4.0-1037.40~18.04.1
5.4.0-1038.41~18.04.1
5.4.0-1039.42~18.04.1
5.4.0-1041.44~18.04.1
5.4.0-1042.45~18.04.1
5.4.0-1043.46~18.04.1
5.4.0-1044.47~18.04.1
5.4.0-1046.50~18.04.2
5.4.0-1048.52~18.04.1
5.4.0-1049.53~18.04.1
5.4.0-1052.56~18.04.1
5.4.0-1053.57~18.04.1
5.4.0-1054.58~18.04.1
5.4.0-1055.59~18.04.1
5.4.0-1056.60~18.04.1
5.4.0-1057.61~18.04.1
5.4.0-1058.62~18.04.1
5.4.0-1059.63~18.04.1
5.4.0-1061.65~18.04.1
5.4.0-1062.66~18.04.1
5.4.0-1063.67~18.04.1
5.4.0-1064.68~18.04.1
5.4.0-1066.71~18.04.1
5.4.0-1067.72~18.04.1
5.4.0-1069.75~18.04.1
5.4.0-1070.76~18.04.1
5.4.0-1071.77~18.04.1
5.4.0-1073.79~18.04.1
5.4.0-1076.83~18.04.1
5.4.0-1078.86~18.04.1
5.4.0-1079.87~18.04.1
5.4.0-1081.89~18.04.1
5.4.0-1082.90~18.04.1
5.4.0-1083.91~18.04.1
5.4.0-1084.92~18.04.1
5.4.0-1086.95~18.04.1
5.4.0-1087.96~18.04.1
5.4.0-1090.99~18.04.2
5.4.0-1091.100~18.04.1
5.4.0-1092.101~18.04.1
5.4.0-1093.102~18.04.1
5.4.0-1094.103~18.04.1
5.4.0-1098.107~18.04.1
5.4.0-1099.108~18.04.1
5.4.0-1100.109~18.04.1
5.4.0-1101.110~18.04.1
5.4.0-1102.111~18.04.1
5.4.0-1103.112~18.04.1
5.4.0-1104.113~18.04.1
5.4.0-1105.114~18.04.1
5.4.0-1106.115~18.04.1
5.4.0-1107.116~18.04.1
5.4.0-1108.117~18.04.1
5.4.0-1109.118~18.04.1
5.4.0-1110.119~18.04.1
5.4.0-1111.120~18.04.1
5.4.0-1112.121~18.04.4
5.4.0-1113.122~18.04.1
5.4.0-1115.124~18.04.1
5.4.0-1116.125~18.04.1
5.4.0-1117.126~18.04.1
5.4.0-1118.127~18.04.1
5.4.0-1119.128~18.04.1
5.4.0-1120.129~18.04.1
5.4.0-1121.130~18.04.1
5.4.0-1122.131~18.04.1
5.4.0-1123.132~18.04.1
5.4.0-1124.133~18.04.1
5.4.0-1125.134~18.04.1
5.4.0-1126.135~18.04.1
5.4.0-1127.136~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.4.0-1129-oracle": "5.4.0-1129.138~18.04.1",
            "linux-buildinfo-5.4.0-1129-oracle": "5.4.0-1129.138~18.04.1",
            "linux-modules-extra-5.4.0-1129-oracle": "5.4.0-1129.138~18.04.1",
            "linux-modules-5.4.0-1129-oracle": "5.4.0-1129.138~18.04.1",
            "linux-oracle-5.4-headers-5.4.0-1129": "5.4.0-1129.138~18.04.1",
            "linux-headers-5.4.0-1129-oracle": "5.4.0-1129.138~18.04.1",
            "linux-oracle-5.4-tools-5.4.0-1129": "5.4.0-1129.138~18.04.1",
            "linux-image-unsigned-5.4.0-1129-oracle-dbgsym": "5.4.0-1129.138~18.04.1",
            "linux-tools-5.4.0-1129-oracle": "5.4.0-1129.138~18.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:Pro:18.04:LTS / linux-raspi-5.4

Package

Name
linux-raspi-5.4
Purl
pkg:deb/ubuntu/linux-raspi-5.4@5.4.0-1114.126~18.04.1?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1114.126~18.04.1

Affected versions

5.*

5.4.0-1013.13~18.04.1
5.4.0-1015.15~18.04.1
5.4.0-1016.17~18.04.1
5.4.0-1018.20~18.04.1
5.4.0-1019.21~18.04.1
5.4.0-1021.24~18.04.1
5.4.0-1022.25~18.04.1
5.4.0-1023.26~18.04.1
5.4.0-1025.28~18.04.1
5.4.0-1026.29~18.04.1
5.4.0-1028.31~18.04.1
5.4.0-1029.32~18.04.1
5.4.0-1030.33~18.04.1
5.4.0-1032.35~18.04.1
5.4.0-1033.36~18.04.1
5.4.0-1034.37~18.04.1
5.4.0-1035.38~18.04.1
5.4.0-1036.39~18.04.1
5.4.0-1038.41~18.04.1
5.4.0-1041.45~18.04.1
5.4.0-1042.46~18.04.3
5.4.0-1043.47~18.04.1
5.4.0-1044.48~18.04.1
5.4.0-1045.49~18.04.1
5.4.0-1046.50~18.04.1
5.4.0-1047.52~18.04.1
5.4.0-1048.53~18.04.1
5.4.0-1050.56~18.04.1
5.4.0-1052.58~18.04.1
5.4.0-1053.60~18.04.1
5.4.0-1055.62~18.04.1
5.4.0-1056.63~18.04.1
5.4.0-1058.65~18.04.1
5.4.0-1059.66~18.04.1
5.4.0-1060.68~18.04.1
5.4.0-1062.70~18.04.1
5.4.0-1065.75~18.04.1
5.4.0-1066.76~18.04.1
5.4.0-1068.78~18.04.1
5.4.0-1069.79~18.04.1
5.4.0-1070.80~18.04.1
5.4.0-1071.81~18.04.1
5.4.0-1073.84~18.04.1
5.4.0-1074.85~18.04.1
5.4.0-1077.88~18.04.2
5.4.0-1078.89~18.04.1
5.4.0-1079.90~18.04.1
5.4.0-1080.91~18.04.1
5.4.0-1081.92~18.04.1
5.4.0-1082.93~18.04.1
5.4.0-1083.94~18.04.1
5.4.0-1084.95~18.04.1
5.4.0-1085.96~18.04.1
5.4.0-1086.97~18.04.1
5.4.0-1088.99~18.04.1
5.4.0-1089.100~18.04.1
5.4.0-1090.101~18.04.1
5.4.0-1091.102~18.04.1
5.4.0-1092.103~18.04.1
5.4.0-1093.104~18.04.1
5.4.0-1094.105~18.04.1
5.4.0-1095.106~18.04.1
5.4.0-1096.107~18.04.1
5.4.0-1097.109~18.04.2
5.4.0-1098.110~18.04.2
5.4.0-1100.112~18.04.1
5.4.0-1101.113~18.04.1
5.4.0-1102.114~18.04.1
5.4.0-1103.115~18.04.1
5.4.0-1104.116~18.04.1
5.4.0-1105.117~18.04.1
5.4.0-1106.118~18.04.1
5.4.0-1107.119~18.04.1
5.4.0-1108.120~18.04.1
5.4.0-1109.121~18.04.1
5.4.0-1110.122~18.04.1
5.4.0-1111.123~18.04.1
5.4.0-1112.124~18.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-raspi-5.4-headers-5.4.0-1114": "5.4.0-1114.126~18.04.1",
            "linux-modules-5.4.0-1114-raspi": "5.4.0-1114.126~18.04.1",
            "linux-image-5.4.0-1114-raspi-dbgsym": "5.4.0-1114.126~18.04.1",
            "linux-raspi-5.4-tools-5.4.0-1114": "5.4.0-1114.126~18.04.1",
            "linux-headers-5.4.0-1114-raspi": "5.4.0-1114.126~18.04.1",
            "linux-tools-5.4.0-1114-raspi": "5.4.0-1114.126~18.04.1",
            "linux-image-5.4.0-1114-raspi": "5.4.0-1114.126~18.04.1",
            "linux-buildinfo-5.4.0-1114-raspi": "5.4.0-1114.126~18.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux@5.4.0-190.210?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-190.210

Affected versions

5.*

5.3.0-18.19
5.3.0-24.26
5.4.0-9.12
5.4.0-18.22
5.4.0-21.25
5.4.0-24.28
5.4.0-25.29
5.4.0-26.30
5.4.0-28.32
5.4.0-29.33
5.4.0-31.35
5.4.0-33.37
5.4.0-37.41
5.4.0-39.43
5.4.0-40.44
5.4.0-42.46
5.4.0-45.49
5.4.0-47.51
5.4.0-48.52
5.4.0-51.56
5.4.0-52.57
5.4.0-53.59
5.4.0-54.60
5.4.0-56.62
5.4.0-58.64
5.4.0-59.65
5.4.0-60.67
5.4.0-62.70
5.4.0-64.72
5.4.0-65.73
5.4.0-66.74
5.4.0-67.75
5.4.0-70.78
5.4.0-71.79
5.4.0-72.80
5.4.0-73.82
5.4.0-74.83
5.4.0-77.86
5.4.0-80.90
5.4.0-81.91
5.4.0-84.94
5.4.0-86.97
5.4.0-88.99
5.4.0-89.100
5.4.0-90.101
5.4.0-91.102
5.4.0-92.103
5.4.0-94.106
5.4.0-96.109
5.4.0-97.110
5.4.0-99.112
5.4.0-100.113
5.4.0-104.118
5.4.0-105.119
5.4.0-107.121
5.4.0-109.123
5.4.0-110.124
5.4.0-113.127
5.4.0-117.132
5.4.0-120.136
5.4.0-121.137
5.4.0-122.138
5.4.0-124.140
5.4.0-125.141
5.4.0-126.142
5.4.0-128.144
5.4.0-131.147
5.4.0-132.148
5.4.0-135.152
5.4.0-136.153
5.4.0-137.154
5.4.0-139.156
5.4.0-144.161
5.4.0-146.163
5.4.0-147.164
5.4.0-148.165
5.4.0-149.166
5.4.0-150.167
5.4.0-152.169
5.4.0-153.170
5.4.0-155.172
5.4.0-156.173
5.4.0-159.176
5.4.0-162.179
5.4.0-163.180
5.4.0-164.181
5.4.0-165.182
5.4.0-166.183
5.4.0-167.184
5.4.0-169.187
5.4.0-170.188
5.4.0-171.189
5.4.0-172.190
5.4.0-173.191
5.4.0-174.193
5.4.0-176.196
5.4.0-177.197
5.4.0-181.201
5.4.0-182.202
5.4.0-186.206
5.4.0-187.207
5.4.0-189.209

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "sata-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "linux-image-unsigned-5.4.0-190-lowlatency-dbgsym": "5.4.0-190.210",
            "nfs-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "usb-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "fs-secondary-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-headers-5.4.0-190-generic": "5.4.0-190.210",
            "linux-headers-5.4.0-190-generic-lpae": "5.4.0-190.210",
            "nfs-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "crypto-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "storage-core-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-udebs-generic": "5.4.0-190.210",
            "nic-pcmcia-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "nic-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "vlan-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "block-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "block-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-tools-5.4.0-190-generic-lpae": "5.4.0-190.210",
            "nic-shared-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-cloud-tools-5.4.0-190-generic": "5.4.0-190.210",
            "serial-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "scsi-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-buildinfo-5.4.0-190-lowlatency": "5.4.0-190.210",
            "floppy-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-buildinfo-5.4.0-190-generic": "5.4.0-190.210",
            "linux-cloud-tools-5.4.0-190": "5.4.0-190.210",
            "linux-image-5.4.0-190-generic-lpae": "5.4.0-190.210",
            "linux-tools-5.4.0-190-lowlatency": "5.4.0-190.210",
            "pata-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "parport-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "usb-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-image-5.4.0-190-generic-lpae-dbgsym": "5.4.0-190.210",
            "linux-tools-5.4.0-190-generic": "5.4.0-190.210",
            "nic-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "input-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "vlan-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "fb-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-modules-5.4.0-190-generic-lpae": "5.4.0-190.210",
            "parport-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "mouse-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "multipath-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "pcmcia-storage-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-buildinfo-5.4.0-190-generic-lpae": "5.4.0-190.210",
            "firewire-core-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "dasd-extra-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-cloud-tools-common": "5.4.0-190.210",
            "input-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "linux-source-5.4.0": "5.4.0-190.210",
            "ipmi-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "md-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "fs-core-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "linux-doc": "5.4.0-190.210",
            "virtio-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-modules-5.4.0-190-generic": "5.4.0-190.210",
            "nic-usb-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "ipmi-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-cloud-tools-5.4.0-190-lowlatency": "5.4.0-190.210",
            "message-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-image-5.4.0-190-generic": "5.4.0-190.210",
            "linux-modules-extra-5.4.0-190-generic": "5.4.0-190.210",
            "nic-usb-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-modules-5.4.0-190-lowlatency": "5.4.0-190.210",
            "storage-core-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "pcmcia-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "plip-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-image-unsigned-5.4.0-190-generic-dbgsym": "5.4.0-190.210",
            "ppp-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "multipath-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "linux-libc-dev": "5.4.0-190.210",
            "nic-shared-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "linux-headers-5.4.0-190": "5.4.0-190.210",
            "linux-tools-host": "5.4.0-190.210",
            "linux-image-unsigned-5.4.0-190-generic": "5.4.0-190.210",
            "fat-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-udebs-generic-lpae": "5.4.0-190.210",
            "linux-image-5.4.0-190-generic-dbgsym": "5.4.0-190.210",
            "fat-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "scsi-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "fs-secondary-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "fs-core-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "kernel-image-5.4.0-190-generic-di": "5.4.0-190.210",
            "linux-headers-5.4.0-190-lowlatency": "5.4.0-190.210",
            "linux-image-unsigned-5.4.0-190-lowlatency": "5.4.0-190.210",
            "linux-tools-5.4.0-190": "5.4.0-190.210",
            "crypto-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "md-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "linux-tools-common": "5.4.0-190.210",
            "ppp-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "plip-modules-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "mouse-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "kernel-image-5.4.0-190-generic-lpae-di": "5.4.0-190.210",
            "sata-modules-5.4.0-190-generic-di": "5.4.0-190.210",
            "dasd-modules-5.4.0-190-generic-di": "5.4.0-190.210"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws@5.4.0-1129.139?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1129.139

Affected versions

5.*

5.3.0-1003.3
5.3.0-1008.9
5.3.0-1009.10
5.3.0-1010.11
5.4.0-1005.5
5.4.0-1007.7
5.4.0-1008.8
5.4.0-1009.9
5.4.0-1011.11
5.4.0-1015.15
5.4.0-1017.17
5.4.0-1018.18
5.4.0-1020.20
5.4.0-1021.21
5.4.0-1022.22
5.4.0-1024.24
5.4.0-1025.25
5.4.0-1028.29
5.4.0-1029.30
5.4.0-1030.31
5.4.0-1032.33
5.4.0-1034.35
5.4.0-1035.37
5.4.0-1037.39
5.4.0-1038.40
5.4.0-1039.41
5.4.0-1041.43
5.4.0-1043.45
5.4.0-1045.47
5.4.0-1047.49
5.4.0-1048.50
5.4.0-1049.51
5.4.0-1051.53
5.4.0-1054.57
5.4.0-1055.58
5.4.0-1056.59
5.4.0-1057.60
5.4.0-1058.61
5.4.0-1059.62
5.4.0-1060.63
5.4.0-1061.64
5.4.0-1063.66
5.4.0-1064.67
5.4.0-1065.68
5.4.0-1066.69
5.4.0-1068.72
5.4.0-1069.73
5.4.0-1071.76
5.4.0-1072.77
5.4.0-1073.78
5.4.0-1075.80
5.4.0-1078.84
5.4.0-1080.87
5.4.0-1081.88
5.4.0-1083.90
5.4.0-1084.91
5.4.0-1085.92
5.4.0-1086.93
5.4.0-1088.96
5.4.0-1089.97
5.4.0-1092.100
5.4.0-1093.101
5.4.0-1094.102
5.4.0-1096.104
5.4.0-1097.105
5.4.0-1099.107
5.4.0-1100.108
5.4.0-1101.109
5.4.0-1102.110
5.4.0-1103.111
5.4.0-1104.112
5.4.0-1105.113
5.4.0-1106.114
5.4.0-1107.115
5.4.0-1108.116
5.4.0-1109.118
5.4.0-1110.119
5.4.0-1111.120
5.4.0-1112.121
5.4.0-1113.123
5.4.0-1114.124
5.4.0-1116.126
5.4.0-1117.127
5.4.0-1118.128
5.4.0-1119.129
5.4.0-1120.130
5.4.0-1121.131
5.4.0-1122.132
5.4.0-1123.133
5.4.0-1124.134
5.4.0-1125.135
5.4.0-1126.136
5.4.0-1127.137
5.4.0-1128.138

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-aws-tools-5.4.0-1129": "5.4.0-1129.139",
            "linux-tools-5.4.0-1129-aws": "5.4.0-1129.139",
            "linux-aws-cloud-tools-5.4.0-1129": "5.4.0-1129.139",
            "linux-buildinfo-5.4.0-1129-aws": "5.4.0-1129.139",
            "linux-image-unsigned-5.4.0-1129-aws-dbgsym": "5.4.0-1129.139",
            "linux-image-unsigned-5.4.0-1129-aws": "5.4.0-1129.139",
            "linux-modules-5.4.0-1129-aws": "5.4.0-1129.139",
            "linux-modules-extra-5.4.0-1129-aws": "5.4.0-1129.139",
            "linux-aws-headers-5.4.0-1129": "5.4.0-1129.139",
            "linux-headers-5.4.0-1129-aws": "5.4.0-1129.139",
            "linux-cloud-tools-5.4.0-1129-aws": "5.4.0-1129.139"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-aws-5.11

Package

Name
linux-aws-5.11

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1009.9~20.04.2
5.11.0-1014.15~20.04.1
5.11.0-1016.17~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.2
5.11.0-1021.22~20.04.2
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-aws-5.13

Package

Name
linux-aws-5.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1008.9~20.04.2
5.13.0-1011.12~20.04.1
5.13.0-1012.13~20.04.1
5.13.0-1014.15~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1019.21~20.04.1
5.13.0-1021.23~20.04.2
5.13.0-1022.24~20.04.1
5.13.0-1023.25~20.04.1
5.13.0-1025.27~20.04.1
5.13.0-1028.31~20.04.1
5.13.0-1029.32~20.04.1
5.13.0-1031.35~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-aws-5.15

Package

Name
linux-aws-5.15
Purl
pkg:deb/ubuntu/linux-aws-5.15@5.15.0-1063.69~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1063.69~20.04.1

Affected versions

5.*

5.15.0-1014.18~20.04.1
5.15.0-1015.19~20.04.1
5.15.0-1017.21~20.04.1
5.15.0-1019.23~20.04.1
5.15.0-1020.24~20.04.1
5.15.0-1021.25~20.04.1
5.15.0-1022.26~20.04.1
5.15.0-1023.27~20.04.1
5.15.0-1026.30~20.04.2
5.15.0-1027.31~20.04.1
5.15.0-1028.32~20.04.1
5.15.0-1030.34~20.04.1
5.15.0-1031.35~20.04.1
5.15.0-1033.37~20.04.1
5.15.0-1034.38~20.04.1
5.15.0-1035.39~20.04.1
5.15.0-1036.40~20.04.1
5.15.0-1037.41~20.04.1
5.15.0-1038.43~20.04.1
5.15.0-1039.44~20.04.1
5.15.0-1040.45~20.04.1
5.15.0-1041.46~20.04.1
5.15.0-1043.48~20.04.1
5.15.0-1044.49~20.04.1
5.15.0-1045.50~20.04.1
5.15.0-1047.52~20.04.1
5.15.0-1048.53~20.04.1
5.15.0-1049.54~20.04.1
5.15.0-1050.55~20.04.1
5.15.0-1051.56~20.04.1
5.15.0-1052.57~20.04.1
5.15.0-1053.58~20.04.1
5.15.0-1055.60~20.04.1
5.15.0-1056.61~20.04.1
5.15.0-1057.63~20.04.1
5.15.0-1058.64~20.04.1
5.15.0-1061.67~20.04.1
5.15.0-1062.68~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1",
            "linux-aws-5.15-headers-5.15.0-1063": "5.15.0-1063.69~20.04.1",
            "linux-image-unsigned-5.15.0-1063-aws-dbgsym": "5.15.0-1063.69~20.04.1",
            "linux-modules-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1",
            "linux-headers-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1",
            "linux-cloud-tools-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1",
            "linux-tools-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1",
            "linux-buildinfo-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1",
            "linux-aws-5.15-tools-5.15.0-1063": "5.15.0-1063.69~20.04.1",
            "linux-modules-extra-5.15.0-1063-aws": "5.15.0-1063.69~20.04.1",
            "linux-aws-5.15-cloud-tools-5.15.0-1063": "5.15.0-1063.69~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-aws-5.8

Package

Name
linux-aws-5.8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1035.37~20.04.1
5.8.0-1038.40~20.04.1
5.8.0-1041.43~20.04.1
5.8.0-1042.44~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@5.4.0-1134.141?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1134.141

Affected versions

5.*

5.3.0-1003.3
5.3.0-1008.9
5.3.0-1009.10
5.4.0-1006.6
5.4.0-1008.8
5.4.0-1009.9
5.4.0-1010.10
5.4.0-1012.12
5.4.0-1016.16
5.4.0-1019.19
5.4.0-1020.20
5.4.0-1022.22
5.4.0-1023.23
5.4.0-1025.25
5.4.0-1026.26
5.4.0-1031.32
5.4.0-1032.33
5.4.0-1034.35
5.4.0-1035.36
5.4.0-1036.38
5.4.0-1039.41
5.4.0-1040.42
5.4.0-1041.43
5.4.0-1043.45
5.4.0-1044.46
5.4.0-1046.48
5.4.0-1047.49
5.4.0-1048.50
5.4.0-1049.51
5.4.0-1051.53
5.4.0-1055.57
5.4.0-1056.58
5.4.0-1058.60
5.4.0-1059.62
5.4.0-1061.64
5.4.0-1062.65
5.4.0-1063.66
5.4.0-1064.67
5.4.0-1065.68
5.4.0-1067.70
5.4.0-1068.71
5.4.0-1069.72
5.4.0-1070.73
5.4.0-1072.75
5.4.0-1073.76
5.4.0-1074.77
5.4.0-1077.80
5.4.0-1078.81
5.4.0-1080.83
5.4.0-1083.87
5.4.0-1085.90
5.4.0-1086.91
5.4.0-1089.94
5.4.0-1090.95
5.4.0-1091.96
5.4.0-1094.100
5.4.0-1095.101
5.4.0-1098.104
5.4.0-1100.106
5.4.0-1101.107
5.4.0-1103.109
5.4.0-1104.110
5.4.0-1105.111
5.4.0-1106.112
5.4.0-1107.113
5.4.0-1108.114
5.4.0-1109.115
5.4.0-1110.116
5.4.0-1111.117
5.4.0-1112.118
5.4.0-1113.119
5.4.0-1114.120
5.4.0-1115.122
5.4.0-1116.123
5.4.0-1117.124
5.4.0-1118.125
5.4.0-1119.126
5.4.0-1120.127
5.4.0-1121.128
5.4.0-1122.129
5.4.0-1123.130
5.4.0-1124.131
5.4.0-1126.133
5.4.0-1127.134
5.4.0-1128.135
5.4.0-1129.136
5.4.0-1130.137
5.4.0-1131.138
5.4.0-1132.139
5.4.0-1133.140

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-azure-headers-5.4.0-1134": "5.4.0-1134.141",
            "linux-azure-cloud-tools-5.4.0-1134": "5.4.0-1134.141",
            "linux-cloud-tools-5.4.0-1134-azure": "5.4.0-1134.141",
            "linux-image-unsigned-5.4.0-1134-azure": "5.4.0-1134.141",
            "linux-tools-5.4.0-1134-azure": "5.4.0-1134.141",
            "linux-modules-5.4.0-1134-azure": "5.4.0-1134.141",
            "linux-modules-extra-5.4.0-1134-azure": "5.4.0-1134.141",
            "linux-azure-tools-5.4.0-1134": "5.4.0-1134.141",
            "linux-headers-5.4.0-1134-azure": "5.4.0-1134.141",
            "linux-image-unsigned-5.4.0-1134-azure-dbgsym": "5.4.0-1134.141",
            "linux-buildinfo-5.4.0-1134-azure": "5.4.0-1134.141"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-azure-5.11

Package

Name
linux-azure-5.11

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1007.7~20.04.2
5.11.0-1012.13~20.04.1
5.11.0-1013.14~20.04.1
5.11.0-1015.16~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-azure-5.13

Package

Name
linux-azure-5.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1009.10~20.04.2
5.13.0-1012.14~20.04.1
5.13.0-1013.15~20.04.1
5.13.0-1014.16~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1021.24~20.04.1
5.13.0-1022.26~20.04.1
5.13.0-1023.27~20.04.1
5.13.0-1025.29~20.04.1
5.13.0-1028.33~20.04.1
5.13.0-1029.34~20.04.1
5.13.0-1031.37~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-azure-5.15

Package

Name
linux-azure-5.15
Purl
pkg:deb/ubuntu/linux-azure-5.15@5.15.0-1065.74~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1065.74~20.04.1

Affected versions

5.*

5.15.0-1007.8~20.04.1
5.15.0-1008.9~20.04.1
5.15.0-1013.16~20.04.1
5.15.0-1014.17~20.04.1
5.15.0-1017.20~20.04.1
5.15.0-1019.24~20.04.1
5.15.0-1020.25~20.04.1
5.15.0-1021.26~20.04.1
5.15.0-1022.27~20.04.1
5.15.0-1023.29~20.04.1
5.15.0-1029.36~20.04.1
5.15.0-1030.37~20.04.1
5.15.0-1031.38~20.04.1
5.15.0-1033.40~20.04.1
5.15.0-1034.41~20.04.1
5.15.0-1035.42~20.04.1
5.15.0-1036.43~20.04.1
5.15.0-1037.44~20.04.1
5.15.0-1038.45~20.04.1
5.15.0-1039.46~20.04.1
5.15.0-1040.47~20.04.1
5.15.0-1041.48~20.04.1
5.15.0-1042.49~20.04.1
5.15.0-1043.50~20.04.1
5.15.0-1045.52~20.04.1
5.15.0-1046.53~20.04.1
5.15.0-1047.54~20.04.1
5.15.0-1049.56~20.04.1
5.15.0-1050.57~20.04.1
5.15.0-1051.59~20.04.1
5.15.0-1052.60~20.04.1
5.15.0-1053.61~20.04.1
5.15.0-1054.62~20.04.1
5.15.0-1056.64~20.04.1
5.15.0-1057.65~20.04.1
5.15.0-1058.66~20.04.2
5.15.0-1059.67~20.04.1
5.15.0-1060.69~20.04.1
5.15.0-1061.70~20.04.1
5.15.0-1063.72~20.04.1
5.15.0-1064.73~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-azure-5.15-cloud-tools-5.15.0-1065": "5.15.0-1065.74~20.04.1",
            "linux-buildinfo-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1",
            "linux-headers-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1",
            "linux-modules-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1",
            "linux-azure-5.15-headers-5.15.0-1065": "5.15.0-1065.74~20.04.1",
            "linux-azure-5.15-tools-5.15.0-1065": "5.15.0-1065.74~20.04.1",
            "linux-cloud-tools-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1",
            "linux-modules-extra-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1",
            "linux-image-unsigned-5.15.0-1065-azure-dbgsym": "5.15.0-1065.74~20.04.1",
            "linux-tools-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1",
            "linux-image-unsigned-5.15.0-1065-azure": "5.15.0-1065.74~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-azure-5.8

Package

Name
linux-azure-5.8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1033.35~20.04.1
5.8.0-1036.38~20.04.1
5.8.0-1039.42~20.04.1
5.8.0-1040.43~20.04.1
5.8.0-1041.44~20.04.1
5.8.0-1042.45~20.04.1
5.8.0-1043.46~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-azure-fde

Package

Name
linux-azure-fde

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1063.66+cvm2.2
5.4.0-1063.66+cvm3.2
5.4.0-1064.67+cvm1.1
5.4.0-1065.68+cvm2.1
5.4.0-1067.70+cvm1.1
5.4.0-1068.71+cvm1.1
5.4.0-1069.72+cvm1.1
5.4.0-1070.73+cvm1.1
5.4.0-1072.75+cvm1.1
5.4.0-1073.76+cvm1.1
5.4.0-1074.77+cvm1.1
5.4.0-1076.79+cvm1.1
5.4.0-1078.81+cvm1.1
5.4.0-1080.83+cvm1.1
5.4.0-1083.87+cvm1.1
5.4.0-1085.90+cvm1.1
5.4.0-1085.90+cvm2.1
5.4.0-1086.91+cvm1.1
5.4.0-1089.94+cvm1.2
5.4.0-1090.95+cvm1.1
5.4.0-1091.96+cvm1.1
5.4.0-1092.97+cvm1.1
5.4.0-1095.101+cvm1.1
5.4.0-1098.104+cvm1.1
5.4.0-1100.106+cvm1.1
5.4.0-1103.109+cvm1.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-azure-fde-5.15

Package

Name
linux-azure-fde-5.15
Purl
pkg:deb/ubuntu/linux-azure-fde-5.15@5.15.0-1065.74~20.04.1.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1065.74~20.04.1.1

Affected versions

5.*

5.15.0-1019.24~20.04.1.1
5.15.0-1020.25~20.04.1.1
5.15.0-1021.26~20.04.1.1
5.15.0-1029.36~20.04.1.1
5.15.0-1030.37~20.04.1.1
5.15.0-1031.38~20.04.1.1
5.15.0-1033.40~20.04.1.1
5.15.0-1034.41~20.04.1.2
5.15.0-1035.42~20.04.1.1
5.15.0-1036.43~20.04.1.1
5.15.0-1037.44~20.04.1.1
5.15.0-1038.45~20.04.1.1
5.15.0-1039.46~20.04.1.1
5.15.0-1040.47~20.04.1.1
5.15.0-1041.48~20.04.1.1
5.15.0-1042.49~20.04.1.1
5.15.0-1043.50~20.04.1.1
5.15.0-1046.53~20.04.1.1
5.15.0-1047.54~20.04.1.1
5.15.0-1049.56~20.04.1.1
5.15.0-1050.57~20.04.1.1
5.15.0-1051.59~20.04.1.1
5.15.0-1052.60~20.04.1.1
5.15.0-1053.61~20.04.1.1
5.15.0-1054.62~20.04.1.1
5.15.0-1056.64~20.04.1.1
5.15.0-1057.65~20.04.1.1
5.15.0-1058.66~20.04.2.1
5.15.0-1059.67~20.04.1.1
5.15.0-1060.69~20.04.1.1
5.15.0-1061.70~20.04.1.1
5.15.0-1063.72~20.04.1.1
5.15.0-1064.73~20.04.1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.15.0-1065-azure-fde-dbgsym": "5.15.0-1065.74~20.04.1.1",
            "linux-image-unsigned-5.15.0-1065-azure-fde": "5.15.0-1065.74~20.04.1.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-bluefield

Package

Name
linux-bluefield
Purl
pkg:deb/ubuntu/linux-bluefield@5.4.0-1089.96?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1089.96

Affected versions

5.*

5.4.0-1007.10
5.4.0-1011.14
5.4.0-1012.15
5.4.0-1013.16
5.4.0-1016.19
5.4.0-1019.22
5.4.0-1020.23
5.4.0-1021.24
5.4.0-1022.25
5.4.0-1023.26
5.4.0-1025.28
5.4.0-1026.29
5.4.0-1028.31
5.4.0-1030.33
5.4.0-1032.35
5.4.0-1035.38
5.4.0-1036.39
5.4.0-1040.44
5.4.0-1042.47
5.4.0-1044.49
5.4.0-1045.50
5.4.0-1046.51
5.4.0-1047.52
5.4.0-1049.55
5.4.0-1050.56
5.4.0-1054.60
5.4.0-1058.64
5.4.0-1059.65
5.4.0-1060.66
5.4.0-1062.68
5.4.0-1064.70
5.4.0-1065.71
5.4.0-1066.72
5.4.0-1068.74
5.4.0-1070.76
5.4.0-1071.77
5.4.0-1072.78
5.4.0-1073.79
5.4.0-1074.80
5.4.0-1075.81
5.4.0-1076.82
5.4.0-1077.83
5.4.0-1078.84
5.4.0-1079.85
5.4.0-1080.87
5.4.0-1081.88
5.4.0-1082.89
5.4.0-1083.90
5.4.0-1084.91
5.4.0-1085.92
5.4.0-1086.93
5.4.0-1087.94
5.4.0-1088.95

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-5.4.0-1089-bluefield": "5.4.0-1089.96",
            "linux-headers-5.4.0-1089-bluefield": "5.4.0-1089.96",
            "linux-tools-5.4.0-1089-bluefield": "5.4.0-1089.96",
            "linux-bluefield-tools-5.4.0-1089": "5.4.0-1089.96",
            "linux-bluefield-headers-5.4.0-1089": "5.4.0-1089.96",
            "linux-image-unsigned-5.4.0-1089-bluefield": "5.4.0-1089.96",
            "linux-image-unsigned-5.4.0-1089-bluefield-dbgsym": "5.4.0-1089.96",
            "linux-buildinfo-5.4.0-1089-bluefield": "5.4.0-1089.96"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp@5.4.0-1133.142?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1133.142

Affected versions

5.*

5.3.0-1004.4
5.3.0-1009.10
5.3.0-1011.12
5.4.0-1005.5
5.4.0-1007.7
5.4.0-1008.8
5.4.0-1009.9
5.4.0-1011.11
5.4.0-1015.15
5.4.0-1018.18
5.4.0-1019.19
5.4.0-1021.21
5.4.0-1022.22
5.4.0-1024.24
5.4.0-1025.25
5.4.0-1028.29
5.4.0-1029.31
5.4.0-1030.32
5.4.0-1032.34
5.4.0-1033.35
5.4.0-1034.37
5.4.0-1036.39
5.4.0-1037.40
5.4.0-1038.41
5.4.0-1040.43
5.4.0-1041.44
5.4.0-1042.45
5.4.0-1043.46
5.4.0-1044.47
5.4.0-1046.49
5.4.0-1049.53
5.4.0-1051.55
5.4.0-1052.56
5.4.0-1053.57
5.4.0-1055.59
5.4.0-1056.60
5.4.0-1057.61
5.4.0-1058.62
5.4.0-1059.63
5.4.0-1060.64
5.4.0-1062.66
5.4.0-1063.67
5.4.0-1064.68
5.4.0-1065.69
5.4.0-1067.71
5.4.0-1068.72
5.4.0-1069.73
5.4.0-1072.77
5.4.0-1073.78
5.4.0-1075.80
5.4.0-1078.84
5.4.0-1080.87
5.4.0-1083.91
5.4.0-1084.92
5.4.0-1086.94
5.4.0-1087.95
5.4.0-1089.97
5.4.0-1090.98
5.4.0-1092.101
5.4.0-1093.102
5.4.0-1096.105
5.4.0-1097.106
5.4.0-1098.107
5.4.0-1100.109
5.4.0-1101.110
5.4.0-1102.111
5.4.0-1103.112
5.4.0-1104.113
5.4.0-1105.114
5.4.0-1106.115
5.4.0-1107.116
5.4.0-1108.117
5.4.0-1109.118
5.4.0-1110.119
5.4.0-1111.120
5.4.0-1112.121
5.4.0-1113.122
5.4.0-1115.124
5.4.0-1116.125
5.4.0-1117.126
5.4.0-1118.127
5.4.0-1120.129
5.4.0-1121.130
5.4.0-1122.131
5.4.0-1123.132
5.4.0-1124.133
5.4.0-1125.134
5.4.0-1126.135
5.4.0-1127.136
5.4.0-1128.137
5.4.0-1129.138
5.4.0-1130.139
5.4.0-1131.140
5.4.0-1132.141

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-gcp-headers-5.4.0-1133": "5.4.0-1133.142",
            "linux-headers-5.4.0-1133-gcp": "5.4.0-1133.142",
            "linux-buildinfo-5.4.0-1133-gcp": "5.4.0-1133.142",
            "linux-modules-extra-5.4.0-1133-gcp": "5.4.0-1133.142",
            "linux-image-unsigned-5.4.0-1133-gcp-dbgsym": "5.4.0-1133.142",
            "linux-gcp-tools-5.4.0-1133": "5.4.0-1133.142",
            "linux-modules-5.4.0-1133-gcp": "5.4.0-1133.142",
            "linux-tools-5.4.0-1133-gcp": "5.4.0-1133.142",
            "linux-image-unsigned-5.4.0-1133-gcp": "5.4.0-1133.142"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gcp-5.11

Package

Name
linux-gcp-5.11

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1009.10~20.04.1
5.11.0-1014.16~20.04.1
5.11.0-1017.19~20.04.1
5.11.0-1018.20~20.04.2
5.11.0-1020.22~20.04.1
5.11.0-1021.23~20.04.1
5.11.0-1022.24~20.04.1
5.11.0-1023.25~20.04.1
5.11.0-1024.26~20.04.1
5.11.0-1026.29~20.04.1
5.11.0-1028.32~20.04.1
5.11.0-1029.33~20.04.3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gcp-5.13

Package

Name
linux-gcp-5.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1008.9~20.04.3
5.13.0-1012.15~20.04.1
5.13.0-1013.16~20.04.1
5.13.0-1015.18~20.04.1
5.13.0-1019.23~20.04.1
5.13.0-1021.25~20.04.1
5.13.0-1023.28~20.04.1
5.13.0-1024.29~20.04.1
5.13.0-1025.30~20.04.1
5.13.0-1027.32~20.04.1
5.13.0-1030.36~20.04.1
5.13.0-1031.37~20.04.1
5.13.0-1033.40~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gcp-5.15

Package

Name
linux-gcp-5.15
Purl
pkg:deb/ubuntu/linux-gcp-5.15@5.15.0-1062.70~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1062.70~20.04.1

Affected versions

5.*

5.15.0-1006.9~20.04.1
5.15.0-1012.17~20.04.1
5.15.0-1013.18~20.04.1
5.15.0-1016.21~20.04.1
5.15.0-1017.23~20.04.2
5.15.0-1018.24~20.04.1
5.15.0-1021.28~20.04.1
5.15.0-1022.29~20.04.1
5.15.0-1025.32~20.04.2
5.15.0-1026.33~20.04.1
5.15.0-1027.34~20.04.1
5.15.0-1029.36~20.04.1
5.15.0-1030.37~20.04.1
5.15.0-1031.38~20.04.1
5.15.0-1032.40~20.04.1
5.15.0-1033.41~20.04.1
5.15.0-1034.42~20.04.1
5.15.0-1035.43~20.04.1
5.15.0-1036.44~20.04.1
5.15.0-1037.45~20.04.1
5.15.0-1038.46~20.04.1
5.15.0-1039.47~20.04.1
5.15.0-1040.48~20.04.1
5.15.0-1041.49~20.04.1
5.15.0-1042.50~20.04.1
5.15.0-1044.52~20.04.1
5.15.0-1045.53~20.04.2
5.15.0-1046.54~20.04.1
5.15.0-1047.55~20.04.1
5.15.0-1048.56~20.04.1
5.15.0-1049.57~20.04.1
5.15.0-1051.59~20.04.1
5.15.0-1052.60~20.04.1
5.15.0-1053.61~20.04.1
5.15.0-1054.62~20.04.1
5.15.0-1055.63~20.04.1
5.15.0-1058.66~20.04.1
5.15.0-1059.67~20.04.1
5.15.0-1060.68~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1",
            "linux-image-unsigned-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1",
            "linux-modules-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1",
            "linux-gcp-5.15-tools-5.15.0-1062": "5.15.0-1062.70~20.04.1",
            "linux-image-unsigned-5.15.0-1062-gcp-dbgsym": "5.15.0-1062.70~20.04.1",
            "linux-gcp-5.15-headers-5.15.0-1062": "5.15.0-1062.70~20.04.1",
            "linux-modules-iwlwifi-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1",
            "linux-headers-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1",
            "linux-modules-extra-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1",
            "linux-tools-5.15.0-1062-gcp": "5.15.0-1062.70~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gcp-5.8

Package

Name
linux-gcp-5.8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1032.34~20.04.1
5.8.0-1035.37~20.04.1
5.8.0-1038.40~20.04.1
5.8.0-1039.41

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gke

Package

Name
linux-gke

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1033.35
5.4.0-1035.37
5.4.0-1036.38
5.4.0-1037.39
5.4.0-1039.41
5.4.0-1041.43
5.4.0-1042.44
5.4.0-1043.45
5.4.0-1044.46
5.4.0-1046.48
5.4.0-1049.52
5.4.0-1051.54
5.4.0-1052.55
5.4.0-1053.56
5.4.0-1054.57
5.4.0-1055.58
5.4.0-1056.59
5.4.0-1057.60
5.4.0-1059.62
5.4.0-1061.64
5.4.0-1062.65
5.4.0-1063.66
5.4.0-1065.68
5.4.0-1066.69
5.4.0-1067.70
5.4.0-1068.71
5.4.0-1071.76
5.4.0-1072.77
5.4.0-1074.79
5.4.0-1076.82
5.4.0-1078.84
5.4.0-1080.86
5.4.0-1081.87
5.4.0-1083.89
5.4.0-1084.90
5.4.0-1086.93
5.4.0-1087.94
5.4.0-1090.97
5.4.0-1091.98
5.4.0-1094.101
5.4.0-1095.102
5.4.0-1096.103
5.4.0-1097.104
5.4.0-1098.105
5.4.0-1099.106
5.4.0-1100.107
5.4.0-1101.108
5.4.0-1102.109
5.4.0-1103.110
5.4.0-1104.111
5.4.0-1105.112

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gke-5.15

Package

Name
linux-gke-5.15

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.15.0-1011.14~20.04.1
5.15.0-1014.17~20.04.1
5.15.0-1015.18~20.04.1
5.15.0-1016.19~20.04.1
5.15.0-1019.23~20.04.1
5.15.0-1020.25~20.04.1
5.15.0-1023.28~20.04.2
5.15.0-1027.32~20.04.1
5.15.0-1028.33~20.04.1
5.15.0-1029.34~20.04.1
5.15.0-1031.36~20.04.1
5.15.0-1032.37~20.04.1
5.15.0-1033.38~20.04.1
5.15.0-1034.39~20.04.1
5.15.0-1036.41~20.04.1
5.15.0-1037.42~20.04.1
5.15.0-1038.43~20.04.1
5.15.0-1039.44~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gkeop

Package

Name
linux-gkeop
Purl
pkg:deb/ubuntu/linux-gkeop@5.4.0-1096.100?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1096.100

Affected versions

5.*

5.4.0-1008.9
5.4.0-1009.10
5.4.0-1010.11
5.4.0-1011.12
5.4.0-1012.13
5.4.0-1013.14
5.4.0-1014.15
5.4.0-1015.16
5.4.0-1016.17
5.4.0-1018.19
5.4.0-1021.22
5.4.0-1022.23
5.4.0-1023.24
5.4.0-1024.25
5.4.0-1025.26
5.4.0-1026.27
5.4.0-1027.28
5.4.0-1029.30
5.4.0-1031.32
5.4.0-1032.33
5.4.0-1033.34
5.4.0-1034.35
5.4.0-1036.37
5.4.0-1037.38
5.4.0-1038.39
5.4.0-1039.40
5.4.0-1040.41
5.4.0-1043.44
5.4.0-1046.48
5.4.0-1048.51
5.4.0-1049.52
5.4.0-1051.54
5.4.0-1052.55
5.4.0-1053.56
5.4.0-1054.57
5.4.0-1056.60
5.4.0-1057.61
5.4.0-1060.64
5.4.0-1061.65
5.4.0-1062.66
5.4.0-1064.68
5.4.0-1065.69
5.4.0-1066.70
5.4.0-1067.71
5.4.0-1068.72
5.4.0-1069.73
5.4.0-1070.74
5.4.0-1071.75
5.4.0-1072.76
5.4.0-1073.77
5.4.0-1074.78
5.4.0-1075.79
5.4.0-1076.80
5.4.0-1077.81
5.4.0-1078.82
5.4.0-1079.83
5.4.0-1080.84
5.4.0-1081.85
5.4.0-1083.87
5.4.0-1084.88
5.4.0-1085.89
5.4.0-1086.90
5.4.0-1087.91
5.4.0-1088.92
5.4.0-1089.93
5.4.0-1090.94
5.4.0-1091.95
5.4.0-1092.96
5.4.0-1093.97
5.4.0-1094.98
5.4.0-1095.99

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-gkeop-headers-5.4.0-1096": "5.4.0-1096.100",
            "linux-gkeop-cloud-tools-5.4.0-1096": "5.4.0-1096.100",
            "linux-image-unsigned-5.4.0-1096-gkeop": "5.4.0-1096.100",
            "linux-image-unsigned-5.4.0-1096-gkeop-dbgsym": "5.4.0-1096.100",
            "linux-gkeop-source-5.4.0": "5.4.0-1096.100",
            "linux-cloud-tools-5.4.0-1096-gkeop": "5.4.0-1096.100",
            "linux-modules-extra-5.4.0-1096-gkeop": "5.4.0-1096.100",
            "linux-headers-5.4.0-1096-gkeop": "5.4.0-1096.100",
            "linux-gkeop-tools-5.4.0-1096": "5.4.0-1096.100",
            "linux-modules-5.4.0-1096-gkeop": "5.4.0-1096.100",
            "linux-buildinfo-5.4.0-1096-gkeop": "5.4.0-1096.100",
            "linux-tools-5.4.0-1096-gkeop": "5.4.0-1096.100"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-gkeop-5.15

Package

Name
linux-gkeop-5.15
Purl
pkg:deb/ubuntu/linux-gkeop-5.15@5.15.0-1046.53~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1046.53~20.04.1

Affected versions

5.*

5.15.0-1003.5~20.04.2
5.15.0-1005.7~20.04.1
5.15.0-1007.10~20.04.1
5.15.0-1008.12~20.04.1
5.15.0-1011.15~20.04.2
5.15.0-1012.16~20.04.1
5.15.0-1013.17~20.04.1
5.15.0-1015.19~20.04.1
5.15.0-1016.21~20.04.1
5.15.0-1017.22~20.04.1
5.15.0-1018.23~20.04.1
5.15.0-1019.24~20.04.1
5.15.0-1020.25~20.04.1
5.15.0-1021.26~20.04.1
5.15.0-1022.27~20.04.1
5.15.0-1023.28~20.04.1
5.15.0-1024.29~20.04.1
5.15.0-1025.30~20.04.1
5.15.0-1026.31~20.04.1
5.15.0-1027.32~20.04.1
5.15.0-1028.33~20.04.1
5.15.0-1030.35~20.04.1
5.15.0-1031.37~20.04.1
5.15.0-1032.38~20.04.1
5.15.0-1033.39~20.04.1
5.15.0-1034.40~20.04.1
5.15.0-1035.41~20.04.1
5.15.0-1036.42~20.04.1
5.15.0-1037.43~20.04.1
5.15.0-1038.44~20.04.1
5.15.0-1039.45~20.04.1
5.15.0-1040.46~20.04.1
5.15.0-1043.50~20.04.1
5.15.0-1044.51~20.04.1
5.15.0-1045.52~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-cloud-tools-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1",
            "linux-headers-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1",
            "linux-gkeop-5.15-headers-5.15.0-1046": "5.15.0-1046.53~20.04.1",
            "linux-gkeop-5.15-tools-5.15.0-1046": "5.15.0-1046.53~20.04.1",
            "linux-modules-extra-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1",
            "linux-image-unsigned-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1",
            "linux-image-unsigned-5.15.0-1046-gkeop-dbgsym": "5.15.0-1046.53~20.04.1",
            "linux-modules-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1",
            "linux-gkeop-5.15-cloud-tools-5.15.0-1046": "5.15.0-1046.53~20.04.1",
            "linux-buildinfo-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1",
            "linux-tools-5.15.0-1046-gkeop": "5.15.0-1046.53~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-hwe-5.11

Package

Name
linux-hwe-5.11

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-22.23~20.04.1
5.11.0-25.27~20.04.1
5.11.0-27.29~20.04.1
5.11.0-34.36~20.04.1
5.11.0-36.40~20.04.1
5.11.0-37.41~20.04.2
5.11.0-38.42~20.04.1
5.11.0-40.44~20.04.2
5.11.0-41.45~20.04.1
5.11.0-43.47~20.04.2
5.11.0-44.48~20.04.2
5.11.0-46.51~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-hwe-5.13

Package

Name
linux-hwe-5.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-21.21~20.04.1
5.13.0-22.22~20.04.1
5.13.0-23.23~20.04.2
5.13.0-25.26~20.04.1
5.13.0-27.29~20.04.1
5.13.0-28.31~20.04.1
5.13.0-30.33~20.04.1
5.13.0-35.40~20.04.1
5.13.0-37.42~20.04.1
5.13.0-39.44~20.04.1
5.13.0-40.45~20.04.1
5.13.0-41.46~20.04.1
5.13.0-44.49~20.04.1
5.13.0-48.54~20.04.1
5.13.0-51.58~20.04.1
5.13.0-52.59~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-hwe-5.15

Package

Name
linux-hwe-5.15
Purl
pkg:deb/ubuntu/linux-hwe-5.15@5.15.0-113.123~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-113.123~20.04.1

Affected versions

5.*

5.15.0-33.34~20.04.1
5.15.0-41.44~20.04.1
5.15.0-43.46~20.04.1
5.15.0-46.49~20.04.1
5.15.0-48.54~20.04.1
5.15.0-50.56~20.04.1
5.15.0-52.58~20.04.1
5.15.0-53.59~20.04.1
5.15.0-56.62~20.04.1
5.15.0-57.63~20.04.1
5.15.0-58.64~20.04.1
5.15.0-60.66~20.04.1
5.15.0-67.74~20.04.1
5.15.0-69.76~20.04.1
5.15.0-70.77~20.04.1
5.15.0-71.78~20.04.1
5.15.0-72.79~20.04.1
5.15.0-73.80~20.04.1
5.15.0-75.82~20.04.1
5.15.0-76.83~20.04.1
5.15.0-78.85~20.04.1
5.15.0-79.86~20.04.2
5.15.0-82.91~20.04.1
5.15.0-83.92~20.04.1
5.15.0-84.93~20.04.1
5.15.0-86.96~20.04.1
5.15.0-87.97~20.04.1
5.15.0-88.98~20.04.1
5.15.0-89.99~20.04.1
5.15.0-91.101~20.04.1
5.15.0-92.102~20.04.1
5.15.0-94.104~20.04.1
5.15.0-97.107~20.04.1
5.15.0-100.110~20.04.1
5.15.0-101.111~20.04.1
5.15.0-102.112~20.04.1
5.15.0-105.115~20.04.1
5.15.0-106.116~20.04.1
5.15.0-107.117~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1",
            "linux-modules-extra-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-buildinfo-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1",
            "linux-hwe-5.15-cloud-tools-common": "5.15.0-113.123~20.04.1",
            "linux-image-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-image-5.15.0-113-generic-dbgsym": "5.15.0-113.123~20.04.1",
            "linux-image-unsigned-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1",
            "linux-hwe-5.15-headers-5.15.0-113": "5.15.0-113.123~20.04.1",
            "linux-modules-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-hwe-5.15-tools-common": "5.15.0-113.123~20.04.1",
            "linux-modules-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1",
            "linux-image-5.15.0-113-generic-lpae-dbgsym": "5.15.0-113.123~20.04.1",
            "linux-image-unsigned-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-hwe-5.15-source-5.15.0": "5.15.0-113.123~20.04.1",
            "linux-buildinfo-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1",
            "linux-modules-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1",
            "linux-modules-iwlwifi-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-tools-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1",
            "linux-headers-5.15.0-113-generic-64k": "5.15.0-113.123~20.04.1",
            "linux-hwe-5.15-cloud-tools-5.15.0-113": "5.15.0-113.123~20.04.1",
            "linux-tools-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1",
            "linux-tools-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-cloud-tools-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-buildinfo-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-headers-5.15.0-113-generic-lpae": "5.15.0-113.123~20.04.1",
            "linux-image-unsigned-5.15.0-113-generic-64k-dbgsym": "5.15.0-113.123~20.04.1",
            "linux-image-unsigned-5.15.0-113-generic-dbgsym": "5.15.0-113.123~20.04.1",
            "linux-headers-5.15.0-113-generic": "5.15.0-113.123~20.04.1",
            "linux-hwe-5.15-tools-host": "5.15.0-113.123~20.04.1",
            "linux-hwe-5.15-tools-5.15.0-113": "5.15.0-113.123~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-hwe-5.8

Package

Name
linux-hwe-5.8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-23.24~20.04.1
5.8.0-25.26~20.04.1
5.8.0-28.30~20.04.1
5.8.0-29.31~20.04.1
5.8.0-31.33~20.04.1
5.8.0-33.36~20.04.1
5.8.0-34.37~20.04.2
5.8.0-36.40~20.04.1
5.8.0-38.43~20.04.1
5.8.0-40.45~20.04.1
5.8.0-41.46~20.04.1
5.8.0-43.49~20.04.1
5.8.0-44.50~20.04.1
5.8.0-45.51~20.04.1
5.8.0-48.54~20.04.1
5.8.0-49.55~20.04.1
5.8.0-50.56~20.04.1
5.8.0-53.60~20.04.1
5.8.0-55.62~20.04.1
5.8.0-59.66~20.04.1
5.8.0-63.71~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-ibm

Package

Name
linux-ibm
Purl
pkg:deb/ubuntu/linux-ibm@5.4.0-1076.81?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1076.81

Affected versions

5.*

5.4.0-1003.4
5.4.0-1004.5
5.4.0-1005.6
5.4.0-1006.7
5.4.0-1007.8
5.4.0-1008.9
5.4.0-1010.11
5.4.0-1012.13
5.4.0-1013.14
5.4.0-1014.15
5.4.0-1015.16
5.4.0-1017.19
5.4.0-1018.20
5.4.0-1019.21
5.4.0-1020.22
5.4.0-1021.23
5.4.0-1023.25
5.4.0-1026.29
5.4.0-1028.32
5.4.0-1029.33
5.4.0-1031.35
5.4.0-1032.36
5.4.0-1033.37
5.4.0-1034.38
5.4.0-1036.41
5.4.0-1037.42
5.4.0-1040.45
5.4.0-1041.46
5.4.0-1042.47
5.4.0-1044.49
5.4.0-1045.50
5.4.0-1046.51
5.4.0-1047.52
5.4.0-1048.53
5.4.0-1049.54
5.4.0-1050.55
5.4.0-1051.56
5.4.0-1052.57
5.4.0-1053.58
5.4.0-1054.59
5.4.0-1056.61
5.4.0-1057.62
5.4.0-1058.63
5.4.0-1059.64
5.4.0-1060.65
5.4.0-1061.66
5.4.0-1063.68
5.4.0-1064.69
5.4.0-1065.70
5.4.0-1066.71
5.4.0-1067.72
5.4.0-1068.73
5.4.0-1069.74
5.4.0-1070.75
5.4.0-1071.76
5.4.0-1072.77
5.4.0-1073.78
5.4.0-1074.79
5.4.0-1075.80

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-ibm-headers-5.4.0-1076": "5.4.0-1076.81",
            "linux-ibm-tools-common": "5.4.0-1076.81",
            "linux-buildinfo-5.4.0-1076-ibm": "5.4.0-1076.81",
            "linux-ibm-cloud-tools-common": "5.4.0-1076.81",
            "linux-tools-5.4.0-1076-ibm": "5.4.0-1076.81",
            "linux-image-unsigned-5.4.0-1076-ibm": "5.4.0-1076.81",
            "linux-image-unsigned-5.4.0-1076-ibm-dbgsym": "5.4.0-1076.81",
            "linux-ibm-source-5.4.0": "5.4.0-1076.81",
            "linux-modules-extra-5.4.0-1076-ibm": "5.4.0-1076.81",
            "linux-ibm-tools-5.4.0-1076": "5.4.0-1076.81",
            "linux-headers-5.4.0-1076-ibm": "5.4.0-1076.81",
            "linux-modules-5.4.0-1076-ibm": "5.4.0-1076.81"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-ibm-5.15

Package

Name
linux-ibm-5.15
Purl
pkg:deb/ubuntu/linux-ibm-5.15@5.15.0-1057.60~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1057.60~20.04.1

Affected versions

5.*

5.15.0-1033.36~20.04.1
5.15.0-1034.37~20.04.1
5.15.0-1035.38~20.04.1
5.15.0-1036.39~20.04.1
5.15.0-1037.40~20.04.1
5.15.0-1038.41~20.04.1
5.15.0-1040.43~20.04.1
5.15.0-1041.44~20.04.1
5.15.0-1042.45~20.04.1
5.15.0-1043.46~20.04.1
5.15.0-1044.47~20.04.1
5.15.0-1045.48~20.04.1
5.15.0-1046.49~20.04.1
5.15.0-1047.50~20.04.1
5.15.0-1048.51~20.04.1
5.15.0-1049.52~20.04.1
5.15.0-1050.53~20.04.1
5.15.0-1053.56~20.04.1
5.15.0-1054.57~20.04.1
5.15.0-1055.58~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-headers-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1",
            "linux-modules-extra-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1",
            "linux-image-unsigned-5.15.0-1057-ibm-dbgsym": "5.15.0-1057.60~20.04.1",
            "linux-ibm-5.15-source-5.15.0": "5.15.0-1057.60~20.04.1",
            "linux-ibm-5.15-headers-5.15.0-1057": "5.15.0-1057.60~20.04.1",
            "linux-tools-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1",
            "linux-buildinfo-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1",
            "linux-image-unsigned-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1",
            "linux-ibm-5.15-tools-5.15.0-1057": "5.15.0-1057.60~20.04.1",
            "linux-modules-5.15.0-1057-ibm": "5.15.0-1057.60~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-intel-5.13

Package

Name
linux-intel-5.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1007.7
5.13.0-1008.8
5.13.0-1009.9
5.13.0-1010.10
5.13.0-1011.11
5.13.0-1014.15
5.13.0-1017.19

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-intel-iotg-5.15

Package

Name
linux-intel-iotg-5.15
Purl
pkg:deb/ubuntu/linux-intel-iotg-5.15@5.15.0-1058.64~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1058.64~20.04.1

Affected versions

5.*

5.15.0-1003.5~20.04.1
5.15.0-1008.11~20.04.1
5.15.0-1010.14~20.04.1
5.15.0-1015.20~20.04.2
5.15.0-1016.21~20.04.1
5.15.0-1017.22~20.04.1
5.15.0-1018.23~20.04.1
5.15.0-1021.26~20.04.1
5.15.0-1023.28~20.04.1
5.15.0-1025.30~20.04.1
5.15.0-1026.31~20.04.1
5.15.0-1027.32~20.04.1
5.15.0-1030.35~20.04.1
5.15.0-1031.36~20.04.1
5.15.0-1033.38~20.04.1
5.15.0-1034.39~20.04.1
5.15.0-1036.41~20.04.1
5.15.0-1037.42~20.04.1
5.15.0-1038.43~20.04.1
5.15.0-1040.46~20.04.1
5.15.0-1043.49~20.04.1
5.15.0-1045.51~20.04.1
5.15.0-1046.52~20.04.1
5.15.0-1048.54~20.04.1
5.15.0-1049.55~20.04.1
5.15.0-1050.56~20.04.1
5.15.0-1051.57~20.04.1
5.15.0-1052.58~20.04.1
5.15.0-1055.61~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-intel-iotg-5.15-tools-common": "5.15.0-1058.64~20.04.1",
            "linux-cloud-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-intel-iotg-5.15-headers-5.15.0-1058": "5.15.0-1058.64~20.04.1",
            "linux-modules-extra-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-modules-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-image-unsigned-5.15.0-1058-intel-iotg-dbgsym": "5.15.0-1058.64~20.04.1",
            "linux-buildinfo-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-intel-iotg-5.15-cloud-tools-5.15.0-1058": "5.15.0-1058.64~20.04.1",
            "linux-modules-iwlwifi-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-image-unsigned-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-headers-5.15.0-1058-intel-iotg": "5.15.0-1058.64~20.04.1",
            "linux-intel-iotg-5.15-cloud-tools-common": "5.15.0-1058.64~20.04.1",
            "linux-intel-iotg-5.15-tools-5.15.0-1058": "5.15.0-1058.64~20.04.1",
            "linux-intel-iotg-5.15-tools-host": "5.15.0-1058.64~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-iot

Package

Name
linux-iot
Purl
pkg:deb/ubuntu/linux-iot@5.4.0-1041.42?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1041.42

Affected versions

5.*

5.4.0-1001.3
5.4.0-1004.6
5.4.0-1005.7
5.4.0-1006.8
5.4.0-1009.11
5.4.0-1010.12
5.4.0-1011.13
5.4.0-1012.14
5.4.0-1013.15
5.4.0-1014.16
5.4.0-1017.18
5.4.0-1018.19
5.4.0-1019.20
5.4.0-1021.22
5.4.0-1022.23
5.4.0-1023.24
5.4.0-1024.25
5.4.0-1025.26
5.4.0-1026.27
5.4.0-1028.29
5.4.0-1029.30
5.4.0-1030.31
5.4.0-1031.32
5.4.0-1032.33
5.4.0-1033.34
5.4.0-1034.35
5.4.0-1035.36
5.4.0-1036.37
5.4.0-1037.38
5.4.0-1038.39
5.4.0-1039.40
5.4.0-1040.41

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-5.4.0-1041-iot-dbgsym": "5.4.0-1041.42",
            "linux-iot-tools-common": "5.4.0-1041.42",
            "linux-tools-5.4.0-1041-iot": "5.4.0-1041.42",
            "linux-image-unsigned-5.4.0-1041-iot": "5.4.0-1041.42",
            "linux-modules-5.4.0-1041-iot": "5.4.0-1041.42",
            "linux-image-unsigned-5.4.0-1041-iot-dbgsym": "5.4.0-1041.42",
            "linux-image-5.4.0-1041-iot": "5.4.0-1041.42",
            "linux-iot-headers-5.4.0-1041": "5.4.0-1041.42",
            "linux-iot-tools-5.4.0-1041": "5.4.0-1041.42",
            "linux-buildinfo-5.4.0-1041-iot": "5.4.0-1041.42",
            "linux-headers-5.4.0-1041-iot": "5.4.0-1041.42"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm@5.4.0-1117.124?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1117.124

Affected versions

5.*

5.3.0-1003.3
5.3.0-1008.9
5.3.0-1009.10
5.4.0-1004.4
5.4.0-1006.6
5.4.0-1007.7
5.4.0-1008.8
5.4.0-1009.9
5.4.0-1011.11
5.4.0-1015.15
5.4.0-1018.18
5.4.0-1020.20
5.4.0-1021.21
5.4.0-1023.23
5.4.0-1024.24
5.4.0-1026.27
5.4.0-1028.29
5.4.0-1030.31
5.4.0-1031.32
5.4.0-1032.33
5.4.0-1033.34
5.4.0-1034.35
5.4.0-1036.37
5.4.0-1037.38
5.4.0-1038.39
5.4.0-1039.40
5.4.0-1040.41
5.4.0-1041.42
5.4.0-1044.46
5.4.0-1045.47
5.4.0-1046.48
5.4.0-1047.49
5.4.0-1048.50
5.4.0-1049.51
5.4.0-1050.52
5.4.0-1051.53
5.4.0-1053.55
5.4.0-1054.56
5.4.0-1055.57
5.4.0-1056.58
5.4.0-1058.61
5.4.0-1059.62
5.4.0-1061.64
5.4.0-1062.65
5.4.0-1063.66
5.4.0-1065.68
5.4.0-1068.72
5.4.0-1070.75
5.4.0-1071.76
5.4.0-1073.78
5.4.0-1074.79
5.4.0-1075.80
5.4.0-1076.81
5.4.0-1078.84
5.4.0-1079.85
5.4.0-1082.88
5.4.0-1083.89
5.4.0-1084.90
5.4.0-1086.92
5.4.0-1087.93
5.4.0-1088.94
5.4.0-1089.95
5.4.0-1090.96
5.4.0-1091.97
5.4.0-1092.98
5.4.0-1093.99
5.4.0-1094.100
5.4.0-1095.101
5.4.0-1096.102
5.4.0-1097.103
5.4.0-1098.104
5.4.0-1099.105
5.4.0-1100.106
5.4.0-1101.107
5.4.0-1102.108
5.4.0-1103.110
5.4.0-1104.111
5.4.0-1105.112
5.4.0-1106.113
5.4.0-1107.114
5.4.0-1108.115
5.4.0-1109.116
5.4.0-1110.117
5.4.0-1111.118
5.4.0-1112.119
5.4.0-1113.120
5.4.0-1114.121
5.4.0-1115.122
5.4.0-1116.123

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-kvm-tools-5.4.0-1117": "5.4.0-1117.124",
            "linux-image-unsigned-5.4.0-1117-kvm": "5.4.0-1117.124",
            "linux-kvm-headers-5.4.0-1117": "5.4.0-1117.124",
            "linux-headers-5.4.0-1117-kvm": "5.4.0-1117.124",
            "linux-buildinfo-5.4.0-1117-kvm": "5.4.0-1117.124",
            "linux-tools-5.4.0-1117-kvm": "5.4.0-1117.124",
            "linux-modules-5.4.0-1117-kvm": "5.4.0-1117.124",
            "linux-image-unsigned-5.4.0-1117-kvm-dbgsym": "5.4.0-1117.124"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-lowlatency-hwe-5.15

Package

Name
linux-lowlatency-hwe-5.15
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-5.15@5.15.0-110.120~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-110.120~20.04.1

Affected versions

5.*

5.15.0-33.34~20.04.1
5.15.0-42.45~20.04.1
5.15.0-43.46~20.04.1
5.15.0-46.49~20.04.1
5.15.0-48.54~20.04.1
5.15.0-50.56~20.04.1
5.15.0-52.58~20.04.1
5.15.0-53.59~20.04.1
5.15.0-56.62~20.04.1
5.15.0-58.64~20.04.1
5.15.0-60.66~20.04.1
5.15.0-67.74~20.04.1
5.15.0-69.76~20.04.1
5.15.0-70.77~20.04.1
5.15.0-71.78~20.04.1
5.15.0-72.79~20.04.1
5.15.0-73.80~20.04.1
5.15.0-75.82~20.04.1
5.15.0-76.83~20.04.1
5.15.0-78.85~20.04.1
5.15.0-79.88~20.04.1
5.15.0-82.91~20.04.1
5.15.0-83.92~20.04.1
5.15.0-84.93~20.04.1
5.15.0-86.95~20.04.1
5.15.0-87.96~20.04.1
5.15.0-88.98~20.04.1
5.15.0-89.99~20.04.1
5.15.0-91.101~20.04.1
5.15.0-92.102~20.04.1
5.15.0-94.104~20.04.1
5.15.0-97.107~20.04.1
5.15.0-100.110~20.04.1
5.15.0-101.111~20.04.1
5.15.0-102.112~20.04.1
5.15.0-105.115~20.04.1
5.15.0-106.116~20.04.1
5.15.0-107.117~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-110": "5.15.0-110.120~20.04.1",
            "linux-modules-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1",
            "linux-lowlatency-hwe-5.15-tools-5.15.0-110": "5.15.0-110.120~20.04.1",
            "linux-image-unsigned-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1",
            "linux-headers-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1",
            "linux-buildinfo-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1",
            "linux-image-unsigned-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1",
            "linux-cloud-tools-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1",
            "linux-modules-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1",
            "linux-modules-iwlwifi-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1",
            "linux-image-unsigned-5.15.0-110-lowlatency-dbgsym": "5.15.0-110.120~20.04.1",
            "linux-lowlatency-hwe-5.15-cloud-tools-common": "5.15.0-110.120~20.04.1",
            "linux-lowlatency-hwe-5.15-headers-5.15.0-110": "5.15.0-110.120~20.04.1",
            "linux-lowlatency-hwe-5.15-tools-common": "5.15.0-110.120~20.04.1",
            "linux-lowlatency-hwe-5.15-tools-host": "5.15.0-110.120~20.04.1",
            "linux-tools-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1",
            "linux-buildinfo-5.15.0-110-lowlatency": "5.15.0-110.120~20.04.1",
            "linux-image-unsigned-5.15.0-110-lowlatency-64k-dbgsym": "5.15.0-110.120~20.04.1",
            "linux-headers-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1",
            "linux-tools-5.15.0-110-lowlatency-64k": "5.15.0-110.120~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oem-5.10

Package

Name
linux-oem-5.10

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.10.0-1008.9
5.10.0-1011.12
5.10.0-1013.14
5.10.0-1014.15
5.10.0-1016.17
5.10.0-1017.18
5.10.0-1019.20
5.10.0-1021.22
5.10.0-1022.23
5.10.0-1023.24
5.10.0-1025.26
5.10.0-1026.27
5.10.0-1029.30
5.10.0-1032.33
5.10.0-1033.34
5.10.0-1034.35
5.10.0-1038.40
5.10.0-1044.46
5.10.0-1045.47
5.10.0-1049.51
5.10.0-1050.52
5.10.0-1051.53
5.10.0-1052.54
5.10.0-1053.55
5.10.0-1055.58
5.10.0-1057.61

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oem-5.13

Package

Name
linux-oem-5.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1009.10
5.13.0-1010.11
5.13.0-1012.16
5.13.0-1014.18
5.13.0-1017.21
5.13.0-1019.23
5.13.0-1020.24
5.13.0-1021.25
5.13.0-1022.26
5.13.0-1026.32
5.13.0-1028.35
5.13.0-1029.36

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oem-5.14

Package

Name
linux-oem-5.14

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.14.0-1004.4
5.14.0-1005.5
5.14.0-1007.7
5.14.0-1008.8
5.14.0-1010.10
5.14.0-1011.11
5.14.0-1013.13
5.14.0-1018.19
5.14.0-1020.22
5.14.0-1022.24
5.14.0-1024.26
5.14.0-1027.30
5.14.0-1029.32
5.14.0-1031.34
5.14.0-1032.35
5.14.0-1033.36
5.14.0-1034.37
5.14.0-1036.40
5.14.0-1038.42
5.14.0-1042.47
5.14.0-1044.49
5.14.0-1045.51
5.14.0-1046.53
5.14.0-1047.54
5.14.0-1048.55
5.14.0-1049.56
5.14.0-1050.57
5.14.0-1051.58
5.14.0-1052.59
5.14.0-1054.61
5.14.0-1055.62
5.14.0-1056.63
5.14.0-1057.64
5.14.0-1058.66
5.14.0-1059.67

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oem-5.6

Package

Name
linux-oem-5.6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.6.0-1007.7
5.6.0-1008.8
5.6.0-1010.10
5.6.0-1011.11
5.6.0-1013.13
5.6.0-1017.17
5.6.0-1018.18
5.6.0-1020.20
5.6.0-1021.21
5.6.0-1023.23
5.6.0-1026.26
5.6.0-1027.27
5.6.0-1028.28
5.6.0-1031.32
5.6.0-1032.33
5.6.0-1033.35
5.6.0-1034.36
5.6.0-1035.37
5.6.0-1036.39
5.6.0-1039.43
5.6.0-1042.46
5.6.0-1047.51
5.6.0-1048.52
5.6.0-1050.54
5.6.0-1052.56
5.6.0-1053.57
5.6.0-1054.58
5.6.0-1055.59
5.6.0-1056.60

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle@5.4.0-1129.138?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1129.138

Affected versions

5.*

5.3.0-1002.2
5.3.0-1007.8
5.3.0-1008.9
5.4.0-1005.5
5.4.0-1007.7
5.4.0-1008.8
5.4.0-1009.9
5.4.0-1011.11
5.4.0-1015.15
5.4.0-1018.18
5.4.0-1019.19
5.4.0-1021.21
5.4.0-1022.22
5.4.0-1024.24
5.4.0-1025.25
5.4.0-1028.29
5.4.0-1029.31
5.4.0-1030.32
5.4.0-1032.34
5.4.0-1034.36
5.4.0-1035.38
5.4.0-1037.40
5.4.0-1038.41
5.4.0-1039.42
5.4.0-1041.44
5.4.0-1042.45
5.4.0-1043.46
5.4.0-1045.49
5.4.0-1046.50
5.4.0-1048.52
5.4.0-1049.53
5.4.0-1052.56
5.4.0-1053.57
5.4.0-1054.58
5.4.0-1055.59
5.4.0-1056.60
5.4.0-1057.61
5.4.0-1058.62
5.4.0-1059.63
5.4.0-1061.65
5.4.0-1062.66
5.4.0-1063.67
5.4.0-1064.68
5.4.0-1066.71
5.4.0-1067.72
5.4.0-1069.75
5.4.0-1070.76
5.4.0-1071.77
5.4.0-1073.79
5.4.0-1076.83
5.4.0-1078.86
5.4.0-1079.87
5.4.0-1081.89
5.4.0-1082.90
5.4.0-1083.91
5.4.0-1084.92
5.4.0-1086.95
5.4.0-1087.96
5.4.0-1090.99
5.4.0-1091.100
5.4.0-1092.101
5.4.0-1093.102
5.4.0-1094.103
5.4.0-1097.106
5.4.0-1098.107
5.4.0-1099.108
5.4.0-1100.109
5.4.0-1101.110
5.4.0-1102.111
5.4.0-1103.112
5.4.0-1104.113
5.4.0-1105.114
5.4.0-1106.115
5.4.0-1107.116
5.4.0-1108.117
5.4.0-1109.118
5.4.0-1110.119
5.4.0-1111.120
5.4.0-1112.121
5.4.0-1113.122
5.4.0-1115.124
5.4.0-1116.125
5.4.0-1117.126
5.4.0-1118.127
5.4.0-1119.128
5.4.0-1120.129
5.4.0-1121.130
5.4.0-1122.131
5.4.0-1123.132
5.4.0-1124.133
5.4.0-1125.134
5.4.0-1126.135
5.4.0-1127.136

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.4.0-1129-oracle": "5.4.0-1129.138",
            "linux-buildinfo-5.4.0-1129-oracle": "5.4.0-1129.138",
            "linux-modules-extra-5.4.0-1129-oracle": "5.4.0-1129.138",
            "linux-modules-5.4.0-1129-oracle": "5.4.0-1129.138",
            "linux-oracle-tools-5.4.0-1129": "5.4.0-1129.138",
            "linux-headers-5.4.0-1129-oracle": "5.4.0-1129.138",
            "linux-image-unsigned-5.4.0-1129-oracle-dbgsym": "5.4.0-1129.138",
            "linux-oracle-headers-5.4.0-1129": "5.4.0-1129.138",
            "linux-tools-5.4.0-1129-oracle": "5.4.0-1129.138"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oracle-5.11

Package

Name
linux-oracle-5.11

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1008.8~20.04.1
5.11.0-1013.14~20.04.1
5.11.0-1016.17~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oracle-5.13

Package

Name
linux-oracle-5.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1011.13~20.04.2
5.13.0-1015.19~20.04.1
5.13.0-1016.20~20.04.1
5.13.0-1018.22~20.04.1
5.13.0-1021.26~20.04.1
5.13.0-1025.30~20.04.1
5.13.0-1027.32~20.04.1
5.13.0-1028.33~20.04.1
5.13.0-1030.35~20.04.1
5.13.0-1033.39~20.04.1
5.13.0-1034.40~20.04.1
5.13.0-1036.43~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oracle-5.15

Package

Name
linux-oracle-5.15
Purl
pkg:deb/ubuntu/linux-oracle-5.15@5.15.0-1061.67~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1061.67~20.04.1

Affected versions

5.*

5.15.0-1007.9~20.04.1
5.15.0-1013.17~20.04.1
5.15.0-1016.20~20.04.1
5.15.0-1017.22~20.04.1
5.15.0-1018.23~20.04.1
5.15.0-1019.24~20.04.1
5.15.0-1021.27~20.04.1
5.15.0-1022.28~20.04.1
5.15.0-1025.31~20.04.2
5.15.0-1027.33~20.04.1
5.15.0-1029.35~20.04.1
5.15.0-1030.36~20.04.1
5.15.0-1032.38~20.04.1
5.15.0-1033.39~20.04.1
5.15.0-1034.40~20.04.1
5.15.0-1035.41~20.04.1
5.15.0-1036.42~20.04.1
5.15.0-1037.43~20.04.1
5.15.0-1038.44~20.04.1
5.15.0-1039.45~20.04.1
5.15.0-1040.46~20.04.1
5.15.0-1041.47~20.04.1
5.15.0-1042.48~20.04.1
5.15.0-1044.50~20.04.1
5.15.0-1045.51~20.04.1
5.15.0-1046.52~20.04.1
5.15.0-1047.53~20.04.1
5.15.0-1048.54~20.04.1
5.15.0-1049.55~20.04.1
5.15.0-1050.56~20.04.1
5.15.0-1051.57~20.04.1
5.15.0-1052.58~20.04.1
5.15.0-1053.59~20.04.1
5.15.0-1054.60~20.04.1
5.15.0-1055.61~20.04.1
5.15.0-1058.64~20.04.1
5.15.0-1059.65~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-oracle-5.15-tools-5.15.0-1061": "5.15.0-1061.67~20.04.1",
            "linux-oracle-5.15-headers-5.15.0-1061": "5.15.0-1061.67~20.04.1",
            "linux-image-unsigned-5.15.0-1061-oracle-dbgsym": "5.15.0-1061.67~20.04.1",
            "linux-modules-extra-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1",
            "linux-buildinfo-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1",
            "linux-headers-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1",
            "linux-modules-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1",
            "linux-tools-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1",
            "linux-image-unsigned-5.15.0-1061-oracle": "5.15.0-1061.67~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-oracle-5.8

Package

Name
linux-oracle-5.8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1031.32~20.04.2
5.8.0-1033.34~20.04.1
5.8.0-1034.35~20.04.2
5.8.0-1037.38~20.04.1
5.8.0-1038.39~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@5.4.0-1113.125?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1113.125

Affected versions

5.*

5.4.0-1007.7
5.4.0-1008.8
5.4.0-1011.11
5.4.0-1012.12
5.4.0-1013.13
5.4.0-1015.15
5.4.0-1016.17
5.4.0-1018.20
5.4.0-1019.21
5.4.0-1021.24
5.4.0-1022.25
5.4.0-1023.26
5.4.0-1025.28
5.4.0-1026.29
5.4.0-1028.31
5.4.0-1029.32
5.4.0-1030.33
5.4.0-1032.35
5.4.0-1033.36
5.4.0-1034.37
5.4.0-1035.38
5.4.0-1036.39
5.4.0-1038.41
5.4.0-1041.45
5.4.0-1042.46
5.4.0-1043.47
5.4.0-1044.48
5.4.0-1045.49
5.4.0-1046.50
5.4.0-1047.52
5.4.0-1048.53
5.4.0-1050.56
5.4.0-1052.58
5.4.0-1053.60
5.4.0-1055.62
5.4.0-1056.63
5.4.0-1058.65
5.4.0-1059.67
5.4.0-1060.68
5.4.0-1062.70
5.4.0-1065.75
5.4.0-1066.76
5.4.0-1068.78
5.4.0-1069.79
5.4.0-1070.80
5.4.0-1071.81
5.4.0-1073.84
5.4.0-1074.85
5.4.0-1077.88
5.4.0-1078.89
5.4.0-1079.90
5.4.0-1080.91
5.4.0-1081.92
5.4.0-1082.93
5.4.0-1083.94
5.4.0-1084.95
5.4.0-1085.96
5.4.0-1086.97
5.4.0-1088.99
5.4.0-1089.100
5.4.0-1090.101
5.4.0-1091.102
5.4.0-1092.103
5.4.0-1093.104
5.4.0-1094.105
5.4.0-1095.106
5.4.0-1096.107
5.4.0-1097.109
5.4.0-1098.110
5.4.0-1100.112
5.4.0-1101.113
5.4.0-1102.114
5.4.0-1103.115
5.4.0-1104.116
5.4.0-1105.117
5.4.0-1106.118
5.4.0-1107.119
5.4.0-1108.120
5.4.0-1109.121
5.4.0-1110.122
5.4.0-1111.123
5.4.0-1112.124

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-5.4.0-1113-raspi": "5.4.0-1113.125",
            "linux-raspi-tools-5.4.0-1113": "5.4.0-1113.125",
            "linux-raspi-headers-5.4.0-1113": "5.4.0-1113.125",
            "linux-image-5.4.0-1113-raspi-dbgsym": "5.4.0-1113.125",
            "linux-buildinfo-5.4.0-1113-raspi": "5.4.0-1113.125",
            "linux-modules-5.4.0-1113-raspi": "5.4.0-1113.125",
            "linux-headers-5.4.0-1113-raspi": "5.4.0-1113.125",
            "linux-tools-5.4.0-1113-raspi": "5.4.0-1113.125"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-raspi2

Package

Name
linux-raspi2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1007.8
5.3.0-1014.16
5.3.0-1015.17
5.3.0-1017.19
5.4.0-1004.4
5.4.0-1006.6

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-riscv

Package

Name
linux-riscv

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-24.28
5.4.0-26.30
5.4.0-27.31
5.4.0-28.32
5.4.0-30.34
5.4.0-31.35
5.4.0-33.37
5.4.0-34.38
5.4.0-36.41
5.4.0-37.42
5.4.0-39.44
5.4.0-40.45

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-riscv-5.11

Package

Name
linux-riscv-5.11

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1015.16~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1018.19~20.04.2
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1024.25~20.04.1
5.11.0-1026.28~20.04.1
5.11.0-1028.31~20.04.1
5.11.0-1029.32~20.04.1
5.11.0-1030.34
5.11.0-1031.35

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-riscv-5.15

Package

Name
linux-riscv-5.15
Purl
pkg:deb/ubuntu/linux-riscv-5.15@5.15.0-1059.63~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1059.63~20.04.1

Affected versions

5.*

5.15.0-1015.17~20.04.1
5.15.0-1017.19~20.04.1
5.15.0-1018.21~20.04.1
5.15.0-1019.22~20.04.1
5.15.0-1022.26~20.04.1
5.15.0-1023.27~20.04.1
5.15.0-1026.30~20.04.2
5.15.0-1027.31~20.04.1
5.15.0-1028.32~20.04.1
5.15.0-1029.33~20.04.1
5.15.0-1030.34~20.04.1
5.15.0-1031.35~20.04.1
5.15.0-1032.36~20.04.1
5.15.0-1033.37~20.04.1
5.15.0-1034.38~20.04.1
5.15.0-1035.39~20.04.1
5.15.0-1036.40~20.04.2
5.15.0-1037.41~20.04.2
5.15.0-1038.42~20.04.2
5.15.0-1039.43~20.04.2
5.15.0-1040.44~20.04.3
5.15.0-1041.45~20.04.1
5.15.0-1043.47~20.04.1
5.15.0-1044.48~20.04.1
5.15.0-1045.49~20.04.1
5.15.0-1046.50~20.04.1
5.15.0-1047.51~20.04.1
5.15.0-1048.52~20.04.1
5.15.0-1049.53~20.04.2
5.15.0-1050.54~20.04.1
5.15.0-1051.55~20.04.1
5.15.0-1052.56~20.04.1
5.15.0-1053.57~20.04.1
5.15.0-1056.60~20.04.1
5.15.0-1057.61~20.04.1
5.15.0-1058.62~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1",
            "linux-image-5.15.0-1059-generic-dbgsym": "5.15.0-1059.63~20.04.1",
            "linux-headers-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1",
            "linux-tools-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1",
            "linux-modules-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1",
            "linux-riscv-5.15-tools-5.15.0-1059": "5.15.0-1059.63~20.04.1",
            "linux-modules-extra-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1",
            "linux-riscv-5.15-headers-5.15.0-1059": "5.15.0-1059.63~20.04.1",
            "linux-image-5.15.0-1059-generic": "5.15.0-1059.63~20.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-riscv-5.8

Package

Name
linux-riscv-5.8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-14.16~20.04.1
5.8.0-14.16~20.04.3
5.8.0-16.18~20.04.1
5.8.0-17.19~20.04.1
5.8.0-18.20~20.04.1
5.8.0-20.22~20.04.1
5.8.0-22.24~20.04.1
5.8.0-25.27~20.04.1
5.8.0-26.28~20.04.1
5.8.0-29.31~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:20.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp@5.4.0-1048.52?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1048.52

Affected versions

5.*

5.4.0-1020.24
5.4.0-1021.25
5.4.0-1022.26
5.4.0-1023.27
5.4.0-1024.28
5.4.0-1025.29
5.4.0-1026.30
5.4.0-1027.31
5.4.0-1028.32
5.4.0-1029.33
5.4.0-1030.34
5.4.0-1031.35
5.4.0-1032.36
5.4.0-1033.37
5.4.0-1034.38
5.4.0-1035.39
5.4.0-1036.40
5.4.0-1037.41
5.4.0-1038.42
5.4.0-1039.43
5.4.0-1040.44
5.4.0-1041.45
5.4.0-1042.46
5.4.0-1043.47
5.4.0-1044.48
5.4.0-1045.49
5.4.0-1046.50
5.4.0-1047.51

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-tools-5.4.0-1048-xilinx-zynqmp": "5.4.0-1048.52",
            "linux-image-5.4.0-1048-xilinx-zynqmp-dbgsym": "5.4.0-1048.52",
            "linux-buildinfo-5.4.0-1048-xilinx-zynqmp": "5.4.0-1048.52",
            "linux-xilinx-zynqmp-headers-5.4.0-1048": "5.4.0-1048.52",
            "linux-headers-5.4.0-1048-xilinx-zynqmp": "5.4.0-1048.52",
            "linux-modules-5.4.0-1048-xilinx-zynqmp": "5.4.0-1048.52",
            "linux-image-5.4.0-1048-xilinx-zynqmp": "5.4.0-1048.52",
            "linux-xilinx-zynqmp-tools-5.4.0-1048": "5.4.0-1048.52"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux@5.15.0-112.122?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-112.122

Affected versions

5.*

5.13.0-19.19
5.15.0-17.17
5.15.0-18.18
5.15.0-22.22
5.15.0-23.23
5.15.0-25.25
5.15.0-27.28
5.15.0-30.31
5.15.0-33.34
5.15.0-35.36
5.15.0-37.39
5.15.0-39.42
5.15.0-40.43
5.15.0-41.44
5.15.0-43.46
5.15.0-46.49
5.15.0-47.51
5.15.0-48.54
5.15.0-50.56
5.15.0-52.58
5.15.0-53.59
5.15.0-56.62
5.15.0-57.63
5.15.0-58.64
5.15.0-60.66
5.15.0-67.74
5.15.0-69.76
5.15.0-70.77
5.15.0-71.78
5.15.0-72.79
5.15.0-73.80
5.15.0-75.82
5.15.0-76.83
5.15.0-78.85
5.15.0-79.86
5.15.0-82.91
5.15.0-83.92
5.15.0-84.93
5.15.0-86.96
5.15.0-87.97
5.15.0-88.98
5.15.0-89.99
5.15.0-91.101
5.15.0-92.102
5.15.0-94.104
5.15.0-97.107
5.15.0-100.110
5.15.0-101.111
5.15.0-102.112
5.15.0-105.115
5.15.0-106.116
5.15.0-107.117

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.15.0-112-generic-64k": "5.15.0-112.122",
            "linux-cloud-tools-5.15.0-112-generic": "5.15.0-112.122",
            "linux-headers-5.15.0-112-generic": "5.15.0-112.122",
            "linux-cloud-tools-common": "5.15.0-112.122",
            "linux-buildinfo-5.15.0-112-generic-lpae": "5.15.0-112.122",
            "linux-libc-dev": "5.15.0-112.122",
            "linux-buildinfo-5.15.0-112-generic": "5.15.0-112.122",
            "linux-doc": "5.15.0-112.122",
            "linux-buildinfo-5.15.0-112-generic-64k": "5.15.0-112.122",
            "linux-modules-iwlwifi-5.15.0-112-generic": "5.15.0-112.122",
            "linux-cloud-tools-5.15.0-112": "5.15.0-112.122",
            "linux-tools-5.15.0-112-generic": "5.15.0-112.122",
            "linux-image-5.15.0-112-generic": "5.15.0-112.122",
            "linux-image-5.15.0-112-generic-lpae-dbgsym": "5.15.0-112.122",
            "linux-source-5.15.0": "5.15.0-112.122",
            "linux-image-5.15.0-112-generic-lpae": "5.15.0-112.122",
            "linux-image-5.15.0-112-generic-dbgsym": "5.15.0-112.122",
            "linux-headers-5.15.0-112-generic-lpae": "5.15.0-112.122",
            "linux-tools-5.15.0-112": "5.15.0-112.122",
            "linux-modules-5.15.0-112-generic-lpae": "5.15.0-112.122",
            "linux-image-unsigned-5.15.0-112-generic": "5.15.0-112.122",
            "linux-tools-host": "5.15.0-112.122",
            "linux-modules-5.15.0-112-generic-64k": "5.15.0-112.122",
            "linux-tools-5.15.0-112-generic-64k": "5.15.0-112.122",
            "linux-modules-5.15.0-112-generic": "5.15.0-112.122",
            "linux-tools-5.15.0-112-generic-lpae": "5.15.0-112.122",
            "linux-headers-5.15.0-112": "5.15.0-112.122",
            "linux-modules-extra-5.15.0-112-generic": "5.15.0-112.122",
            "linux-tools-common": "5.15.0-112.122",
            "linux-headers-5.15.0-112-generic-64k": "5.15.0-112.122",
            "linux-image-unsigned-5.15.0-112-generic-64k-dbgsym": "5.15.0-112.122",
            "linux-image-unsigned-5.15.0-112-generic-dbgsym": "5.15.0-112.122"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-allwinner-5.19

Package

Name
linux-allwinner-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1007.7~22.04.1
5.19.0-1009.9~22.04.1
5.19.0-1010.10~22.04.1
5.19.0-1011.11~22.04.1
5.19.0-1012.12~22.04.1
5.19.0-1013.13~22.04.1
5.19.0-1014.14~22.04.1
5.19.0-1015.15~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws@5.15.0-1063.69?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1063.69

Affected versions

5.*

5.13.0-1005.6
5.15.0-1002.4
5.15.0-1003.5
5.15.0-1004.6
5.15.0-1005.7
5.15.0-1008.10
5.15.0-1009.11
5.15.0-1011.14
5.15.0-1013.17
5.15.0-1014.18
5.15.0-1015.19
5.15.0-1017.21
5.15.0-1019.23
5.15.0-1020.24
5.15.0-1021.25
5.15.0-1022.26
5.15.0-1023.27
5.15.0-1026.30
5.15.0-1027.31
5.15.0-1028.32
5.15.0-1030.34
5.15.0-1031.35
5.15.0-1033.37
5.15.0-1034.38
5.15.0-1035.39
5.15.0-1036.40
5.15.0-1037.41
5.15.0-1038.43
5.15.0-1039.44
5.15.0-1040.45
5.15.0-1042.47
5.15.0-1043.48
5.15.0-1044.49
5.15.0-1045.50
5.15.0-1047.52
5.15.0-1048.53
5.15.0-1049.54
5.15.0-1050.55
5.15.0-1051.56
5.15.0-1052.57
5.15.0-1053.58
5.15.0-1055.60
5.15.0-1056.61
5.15.0-1057.63
5.15.0-1060.66
5.15.0-1061.67
5.15.0-1062.68

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.15.0-1063-aws": "5.15.0-1063.69",
            "linux-modules-5.15.0-1063-aws": "5.15.0-1063.69",
            "linux-image-unsigned-5.15.0-1063-aws-dbgsym": "5.15.0-1063.69",
            "linux-aws-tools-5.15.0-1063": "5.15.0-1063.69",
            "linux-headers-5.15.0-1063-aws": "5.15.0-1063.69",
            "linux-cloud-tools-5.15.0-1063-aws": "5.15.0-1063.69",
            "linux-tools-5.15.0-1063-aws": "5.15.0-1063.69",
            "linux-aws-cloud-tools-5.15.0-1063": "5.15.0-1063.69",
            "linux-buildinfo-5.15.0-1063-aws": "5.15.0-1063.69",
            "linux-modules-extra-5.15.0-1063-aws": "5.15.0-1063.69",
            "linux-aws-headers-5.15.0-1063": "5.15.0-1063.69"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-aws-5.19

Package

Name
linux-aws-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1019.20~22.04.1
5.19.0-1020.21~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1024.25~22.04.1
5.19.0-1025.26~22.04.1
5.19.0-1026.27~22.04.1
5.19.0-1027.28~22.04.1
5.19.0-1028.29~22.04.1
5.19.0-1029.30~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-aws-6.2

Package

Name
linux-aws-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1010.10~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-aws-6.5

Package

Name
linux-aws-6.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1008.8~22.04.1
6.5.0-1010.10~22.04.1
6.5.0-1011.11~22.04.1
6.5.0-1012.12~22.04.1
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.2
6.5.0-1018.18~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1021.21~22.04.1
6.5.0-1022.22~22.04.1
6.5.0-1023.23~22.04.1
6.5.0-1024.24~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@5.15.0-1066.75?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1066.75

Affected versions

5.*

5.13.0-1006.7
5.15.0-1001.2
5.15.0-1002.3
5.15.0-1003.4
5.15.0-1005.6
5.15.0-1007.8
5.15.0-1008.9
5.15.0-1010.12
5.15.0-1012.15
5.15.0-1013.16
5.15.0-1014.17
5.15.0-1017.20
5.15.0-1019.24
5.15.0-1020.25
5.15.0-1021.26
5.15.0-1022.27
5.15.0-1023.29
5.15.0-1024.30
5.15.0-1029.36
5.15.0-1030.37
5.15.0-1031.38
5.15.0-1033.40
5.15.0-1034.41
5.15.0-1035.42
5.15.0-1036.43
5.15.0-1037.44
5.15.0-1038.45
5.15.0-1039.46
5.15.0-1040.47
5.15.0-1041.48
5.15.0-1042.49
5.15.0-1044.51
5.15.0-1045.52
5.15.0-1046.53
5.15.0-1047.54
5.15.0-1049.56
5.15.0-1050.57
5.15.0-1051.59
5.15.0-1052.60
5.15.0-1053.61
5.15.0-1054.62
5.15.0-1056.64
5.15.0-1057.65
5.15.0-1058.66
5.15.0-1059.67
5.15.0-1060.69
5.15.0-1061.70
5.15.0-1063.72
5.15.0-1064.73

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-headers-5.15.0-1066-azure": "5.15.0-1066.75",
            "linux-azure-cloud-tools-5.15.0-1066": "5.15.0-1066.75",
            "linux-azure-tools-5.15.0-1066": "5.15.0-1066.75",
            "linux-buildinfo-5.15.0-1066-azure": "5.15.0-1066.75",
            "linux-tools-5.15.0-1066-azure": "5.15.0-1066.75",
            "linux-azure-headers-5.15.0-1066": "5.15.0-1066.75",
            "linux-modules-5.15.0-1066-azure": "5.15.0-1066.75",
            "linux-image-unsigned-5.15.0-1066-azure-dbgsym": "5.15.0-1066.75",
            "linux-modules-extra-5.15.0-1066-azure": "5.15.0-1066.75",
            "linux-cloud-tools-5.15.0-1066-azure": "5.15.0-1066.75",
            "linux-image-unsigned-5.15.0-1066-azure": "5.15.0-1066.75"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-azure-5.19

Package

Name
linux-azure-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1020.21~22.04.1
5.19.0-1021.22~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1025.28~22.04.1
5.19.0-1026.29~22.04.1
5.19.0-1027.30~22.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-azure-6.2

Package

Name
linux-azure-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1
6.2.0-1019.19~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-azure-6.5

Package

Name
linux-azure-6.5
Purl
pkg:deb/ubuntu/linux-azure-6.5@6.5.0-1022.23~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-1022.23~22.04.1

Affected versions

6.*

6.5.0-1007.7~22.04.1
6.5.0-1009.9~22.04.1
6.5.0-1010.10~22.04.1
6.5.0-1011.11~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.1
6.5.0-1018.19~22.04.2
6.5.0-1019.20~22.04.1
6.5.0-1021.22~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-azure-6.5-headers-6.5.0-1022": "6.5.0-1022.23~22.04.1",
            "linux-azure-6.5-tools-6.5.0-1022": "6.5.0-1022.23~22.04.1",
            "linux-tools-6.5.0-1022-azure": "6.5.0-1022.23~22.04.1",
            "linux-cloud-tools-6.5.0-1022-azure": "6.5.0-1022.23~22.04.1",
            "linux-buildinfo-6.5.0-1022-azure": "6.5.0-1022.23~22.04.1",
            "linux-modules-6.5.0-1022-azure": "6.5.0-1022.23~22.04.1",
            "linux-modules-extra-6.5.0-1022-azure": "6.5.0-1022.23~22.04.1",
            "linux-image-unsigned-6.5.0-1022-azure-dbgsym": "6.5.0-1022.23~22.04.1",
            "linux-image-unsigned-6.5.0-1022-azure": "6.5.0-1022.23~22.04.1",
            "linux-headers-6.5.0-1022-azure": "6.5.0-1022.23~22.04.1",
            "linux-azure-6.5-cloud-tools-6.5.0-1022": "6.5.0-1022.23~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-azure-fde

Package

Name
linux-azure-fde
Purl
pkg:deb/ubuntu/linux-azure-fde@5.15.0-1067.76.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1067.76.1

Affected versions

5.*

5.15.0-1019.24.1
5.15.0-1024.30.1
5.15.0-1029.36.1
5.15.0-1030.37.1
5.15.0-1031.38.1
5.15.0-1033.40.1
5.15.0-1034.41.1
5.15.0-1035.42.1
5.15.0-1036.43.1
5.15.0-1037.44.1
5.15.0-1038.45.1
5.15.0-1039.46.1
5.15.0-1041.48.1
5.15.0-1042.49.1
5.15.0-1044.51.1
5.15.0-1045.52.1
5.15.0-1046.53.1
5.15.0-1047.54.1
5.15.0-1049.56.1
5.15.0-1050.57.1
5.15.0-1051.59.1
5.15.0-1052.60.1
5.15.0-1053.61.1
5.15.0-1054.62.1
5.15.0-1056.64.1
5.15.0-1057.65.1
5.15.0-1058.66.1
5.15.0-1059.67.1
5.15.0-1060.69.1
5.15.0-1061.70.1
5.15.0-1063.72.1
5.15.0-1064.73.1
5.15.0-1065.74.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.15.0-1067-azure-fde": "5.15.0-1067.76.1",
            "linux-image-unsigned-5.15.0-1067-azure-fde-dbgsym": "5.15.0-1067.76.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-azure-fde-5.19

Package

Name
linux-azure-fde-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1025.28~22.04.1.1
5.19.0-1026.29~22.04.1.1
5.19.0-1027.30~22.04.2.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-azure-fde-6.2

Package

Name
linux-azure-fde-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1008.8~22.04.1.1
6.2.0-1009.9~22.04.3.1
6.2.0-1011.11~22.04.1.1
6.2.0-1012.12~22.04.1.1
6.2.0-1014.14~22.04.1.1
6.2.0-1015.15~22.04.1.1
6.2.0-1016.16~22.04.1.1
6.2.0-1017.17~22.04.1.1
6.2.0-1018.18~22.04.1.1
6.2.0-1019.19~22.04.1.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp@5.15.0-1062.70?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1062.70

Affected versions

5.*

5.13.0-1005.6
5.15.0-1001.3
5.15.0-1002.5
5.15.0-1003.6
5.15.0-1004.7
5.15.0-1005.8
5.15.0-1006.9
5.15.0-1008.12
5.15.0-1010.15
5.15.0-1013.18
5.15.0-1016.21
5.15.0-1017.23
5.15.0-1018.24
5.15.0-1019.25
5.15.0-1021.28
5.15.0-1022.29
5.15.0-1025.32
5.15.0-1026.33
5.15.0-1027.34
5.15.0-1029.36
5.15.0-1030.37
5.15.0-1031.38
5.15.0-1032.40
5.15.0-1034.42
5.15.0-1035.43
5.15.0-1036.44
5.15.0-1037.45
5.15.0-1038.46
5.15.0-1039.47
5.15.0-1040.48
5.15.0-1041.49
5.15.0-1042.50
5.15.0-1044.52
5.15.0-1045.53
5.15.0-1046.54
5.15.0-1047.55
5.15.0-1048.56
5.15.0-1049.57
5.15.0-1051.59
5.15.0-1052.60
5.15.0-1053.61
5.15.0-1054.62
5.15.0-1055.63
5.15.0-1058.66
5.15.0-1059.67
5.15.0-1060.68

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-gcp-tools-5.15.0-1062": "5.15.0-1062.70",
            "linux-image-unsigned-5.15.0-1062-gcp": "5.15.0-1062.70",
            "linux-gcp-headers-5.15.0-1062": "5.15.0-1062.70",
            "linux-modules-extra-5.15.0-1062-gcp": "5.15.0-1062.70",
            "linux-modules-5.15.0-1062-gcp": "5.15.0-1062.70",
            "linux-image-unsigned-5.15.0-1062-gcp-dbgsym": "5.15.0-1062.70",
            "linux-headers-5.15.0-1062-gcp": "5.15.0-1062.70",
            "linux-buildinfo-5.15.0-1062-gcp": "5.15.0-1062.70",
            "linux-tools-5.15.0-1062-gcp": "5.15.0-1062.70"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-gcp-5.19

Package

Name
linux-gcp-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1020.22~22.04.2
5.19.0-1021.23~22.04.1
5.19.0-1022.24~22.04.1
5.19.0-1024.26~22.04.1
5.19.0-1025.27~22.04.1
5.19.0-1026.28~22.04.1
5.19.0-1027.29~22.04.1
5.19.0-1030.32~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-gcp-6.2

Package

Name
linux-gcp-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1009.9~22.04.3
6.2.0-1010.10~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1011.11~22.04.3
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1016.18~22.04.1
6.2.0-1017.19~22.04.1
6.2.0-1018.20~22.04.1
6.2.0-1019.21~22.04.1
6.2.0-1021.23~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-gcp-6.5

Package

Name
linux-gcp-6.5
Purl
pkg:deb/ubuntu/linux-gcp-6.5@6.5.0-1022.24~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-1022.24~22.04.1

Affected versions

6.*

6.5.0-1010.10~22.04.3
6.5.0-1011.11~22.04.1
6.5.0-1013.13~22.04.1
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.1
6.5.0-1018.18~22.04.1
6.5.0-1020.20~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-gcp-6.5-headers-6.5.0-1022": "6.5.0-1022.24~22.04.1",
            "linux-image-unsigned-6.5.0-1022-gcp": "6.5.0-1022.24~22.04.1",
            "linux-gcp-6.5-tools-6.5.0-1022": "6.5.0-1022.24~22.04.1",
            "linux-modules-iwlwifi-6.5.0-1022-gcp": "6.5.0-1022.24~22.04.1",
            "linux-tools-6.5.0-1022-gcp": "6.5.0-1022.24~22.04.1",
            "linux-buildinfo-6.5.0-1022-gcp": "6.5.0-1022.24~22.04.1",
            "linux-image-unsigned-6.5.0-1022-gcp-dbgsym": "6.5.0-1022.24~22.04.1",
            "linux-modules-extra-6.5.0-1022-gcp": "6.5.0-1022.24~22.04.1",
            "linux-headers-6.5.0-1022-gcp": "6.5.0-1022.24~22.04.1",
            "linux-modules-6.5.0-1022-gcp": "6.5.0-1022.24~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke@5.15.0-1060.66?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1060.66

Affected versions

5.*

5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.5
5.15.0-1005.6
5.15.0-1006.7
5.15.0-1008.10
5.15.0-1010.13
5.15.0-1011.14
5.15.0-1014.17
5.15.0-1015.18
5.15.0-1016.19
5.15.0-1017.20
5.15.0-1019.23
5.15.0-1020.25
5.15.0-1023.28
5.15.0-1024.29
5.15.0-1027.32
5.15.0-1028.33
5.15.0-1030.35
5.15.0-1031.36
5.15.0-1032.37
5.15.0-1033.38
5.15.0-1034.39
5.15.0-1035.40
5.15.0-1036.41
5.15.0-1037.42
5.15.0-1038.43
5.15.0-1039.44
5.15.0-1040.45
5.15.0-1041.46
5.15.0-1042.47
5.15.0-1044.49
5.15.0-1045.50
5.15.0-1046.51
5.15.0-1047.52
5.15.0-1048.53
5.15.0-1049.54
5.15.0-1050.55
5.15.0-1051.56
5.15.0-1052.57
5.15.0-1053.58
5.15.0-1054.59
5.15.0-1057.62
5.15.0-1058.63
5.15.0-1059.64

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-gke-tools-5.15.0-1060": "5.15.0-1060.66",
            "linux-tools-5.15.0-1060-gke": "5.15.0-1060.66",
            "linux-modules-5.15.0-1060-gke": "5.15.0-1060.66",
            "linux-gke-headers-5.15.0-1060": "5.15.0-1060.66",
            "linux-image-unsigned-5.15.0-1060-gke-dbgsym": "5.15.0-1060.66",
            "linux-headers-5.15.0-1060-gke": "5.15.0-1060.66",
            "linux-buildinfo-5.15.0-1060-gke": "5.15.0-1060.66",
            "linux-modules-extra-5.15.0-1060-gke": "5.15.0-1060.66",
            "linux-image-unsigned-5.15.0-1060-gke": "5.15.0-1060.66"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-gkeop

Package

Name
linux-gkeop
Purl
pkg:deb/ubuntu/linux-gkeop@5.15.0-1046.53?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1046.53

Affected versions

5.*

5.15.0-1001.2
5.15.0-1002.4
5.15.0-1003.5
5.15.0-1004.6
5.15.0-1005.7
5.15.0-1007.10
5.15.0-1008.12
5.15.0-1011.15
5.15.0-1012.16
5.15.0-1013.17
5.15.0-1015.19
5.15.0-1016.21
5.15.0-1017.22
5.15.0-1018.23
5.15.0-1019.24
5.15.0-1020.25
5.15.0-1021.26
5.15.0-1022.27
5.15.0-1023.28
5.15.0-1024.29
5.15.0-1025.30
5.15.0-1026.31
5.15.0-1027.32
5.15.0-1028.33
5.15.0-1030.35
5.15.0-1031.37
5.15.0-1032.38
5.15.0-1033.39
5.15.0-1034.40
5.15.0-1035.41
5.15.0-1036.42
5.15.0-1037.43
5.15.0-1038.44
5.15.0-1039.45
5.15.0-1040.46
5.15.0-1043.50
5.15.0-1044.51
5.15.0-1045.52

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-cloud-tools-5.15.0-1046-gkeop": "5.15.0-1046.53",
            "linux-headers-5.15.0-1046-gkeop": "5.15.0-1046.53",
            "linux-modules-extra-5.15.0-1046-gkeop": "5.15.0-1046.53",
            "linux-image-unsigned-5.15.0-1046-gkeop": "5.15.0-1046.53",
            "linux-gkeop-cloud-tools-5.15.0-1046": "5.15.0-1046.53",
            "linux-image-unsigned-5.15.0-1046-gkeop-dbgsym": "5.15.0-1046.53",
            "linux-gkeop-tools-5.15.0-1046": "5.15.0-1046.53",
            "linux-tools-5.15.0-1046-gkeop": "5.15.0-1046.53",
            "linux-buildinfo-5.15.0-1046-gkeop": "5.15.0-1046.53",
            "linux-gkeop-headers-5.15.0-1046": "5.15.0-1046.53",
            "linux-modules-5.15.0-1046-gkeop": "5.15.0-1046.53"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-hwe-5.19

Package

Name
linux-hwe-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-28.29~22.04.1
5.19.0-32.33~22.04.1
5.19.0-35.36~22.04.1
5.19.0-38.39~22.04.1
5.19.0-40.41~22.04.1
5.19.0-41.42~22.04.1
5.19.0-42.43~22.04.1
5.19.0-43.44~22.04.1
5.19.0-45.46~22.04.1
5.19.0-46.47~22.04.1
5.19.0-50.50

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-hwe-6.2

Package

Name
linux-hwe-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-25.25~22.04.2
6.2.0-26.26~22.04.1
6.2.0-31.31~22.04.1
6.2.0-32.32~22.04.1
6.2.0-33.33~22.04.1
6.2.0-34.34~22.04.1
6.2.0-35.35~22.04.1
6.2.0-36.37~22.04.1
6.2.0-37.38~22.04.1
6.2.0-39.40~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-hwe-6.5

Package

Name
linux-hwe-6.5
Purl
pkg:deb/ubuntu/linux-hwe-6.5@6.5.0-41.41~22.04.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-41.41~22.04.2

Affected versions

6.*

6.5.0-14.14~22.04.1
6.5.0-15.15~22.04.1
6.5.0-17.17~22.04.1
6.5.0-18.18~22.04.1
6.5.0-21.21~22.04.1
6.5.0-25.25~22.04.1
6.5.0-26.26~22.04.1
6.5.0-27.28~22.04.1
6.5.0-28.29~22.04.1
6.5.0-35.35~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-cloud-tools-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-modules-ipu6-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-hwe-6.5-tools-6.5.0-41": "6.5.0-41.41~22.04.2",
            "linux-image-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-image-6.5.0-41-generic-dbgsym": "6.5.0-41.41~22.04.2",
            "linux-headers-6.5.0-41-generic-64k": "6.5.0-41.41~22.04.2",
            "linux-image-unsigned-6.5.0-41-generic-dbgsym": "6.5.0-41.41~22.04.2",
            "linux-modules-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-hwe-6.5-headers-6.5.0-41": "6.5.0-41.41~22.04.2",
            "linux-tools-6.5.0-41-generic-64k": "6.5.0-41.41~22.04.2",
            "linux-hwe-6.5-tools-host": "6.5.0-41.41~22.04.2",
            "linux-headers-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-hwe-6.5-cloud-tools-6.5.0-41": "6.5.0-41.41~22.04.2",
            "linux-modules-ivsc-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-image-unsigned-6.5.0-41-generic-64k": "6.5.0-41.41~22.04.2",
            "linux-buildinfo-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-hwe-6.5-tools-common": "6.5.0-41.41~22.04.2",
            "linux-hwe-6.5-cloud-tools-common": "6.5.0-41.41~22.04.2",
            "linux-modules-6.5.0-41-generic-64k": "6.5.0-41.41~22.04.2",
            "linux-source-6.5.0": "6.5.0-41.41~22.04.2",
            "linux-image-unsigned-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-buildinfo-6.5.0-41-generic-64k": "6.5.0-41.41~22.04.2",
            "linux-tools-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-modules-iwlwifi-6.5.0-41-generic": "6.5.0-41.41~22.04.2",
            "linux-image-unsigned-6.5.0-41-generic-64k-dbgsym": "6.5.0-41.41~22.04.2",
            "linux-modules-extra-6.5.0-41-generic": "6.5.0-41.41~22.04.2"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-hwe-6.8

Package

Name
linux-hwe-6.8
Purl
pkg:deb/ubuntu/linux-hwe-6.8@6.8.0-38.38~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-38.38~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-6.8.0-38-generic-64k-dbgsym": "6.8.0-38.38~22.04.1",
            "linux-buildinfo-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1",
            "linux-modules-iwlwifi-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-image-6.8.0-38-generic-dbgsym": "6.8.0-38.38~22.04.1",
            "linux-cloud-tools-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-modules-ipu6-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-headers-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1",
            "linux-tools-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-headers-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-hwe-6.8-cloud-tools-6.8.0-38": "6.8.0-38.38~22.04.1",
            "linux-modules-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-modules-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1",
            "linux-modules-usbio-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-hwe-6.8-tools-6.8.0-38": "6.8.0-38.38~22.04.1",
            "linux-image-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-hwe-6.8-headers-6.8.0-38": "6.8.0-38.38~22.04.1",
            "linux-image-unsigned-6.8.0-38-generic-dbgsym": "6.8.0-38.38~22.04.1",
            "linux-buildinfo-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-image-unsigned-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1",
            "linux-modules-extra-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-image-unsigned-6.8.0-38-generic": "6.8.0-38.38~22.04.1",
            "linux-tools-6.8.0-38-generic-64k": "6.8.0-38.38~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-ibm

Package

Name
linux-ibm
Purl
pkg:deb/ubuntu/linux-ibm@5.15.0-1056.59?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1056.59

Affected versions

5.*

5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1007.8
5.15.0-1009.11
5.15.0-1010.12
5.15.0-1012.14
5.15.0-1013.15
5.15.0-1015.17
5.15.0-1017.20
5.15.0-1018.21
5.15.0-1021.24
5.15.0-1022.25
5.15.0-1023.26
5.15.0-1025.28
5.15.0-1026.29
5.15.0-1027.30
5.15.0-1028.31
5.15.0-1029.32
5.15.0-1030.33
5.15.0-1031.34
5.15.0-1032.35
5.15.0-1033.36
5.15.0-1034.37
5.15.0-1035.38
5.15.0-1036.39
5.15.0-1037.40
5.15.0-1038.41
5.15.0-1040.43
5.15.0-1041.44
5.15.0-1042.45
5.15.0-1043.46
5.15.0-1044.47
5.15.0-1045.48
5.15.0-1046.49
5.15.0-1047.50
5.15.0-1048.51
5.15.0-1049.52
5.15.0-1050.53
5.15.0-1053.56
5.15.0-1054.57
5.15.0-1055.58

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-extra-5.15.0-1056-ibm": "5.15.0-1056.59",
            "linux-ibm-tools-common": "5.15.0-1056.59",
            "linux-buildinfo-5.15.0-1056-ibm": "5.15.0-1056.59",
            "linux-ibm-source-5.15.0": "5.15.0-1056.59",
            "linux-headers-5.15.0-1056-ibm": "5.15.0-1056.59",
            "linux-image-unsigned-5.15.0-1056-ibm": "5.15.0-1056.59",
            "linux-ibm-tools-5.15.0-1056": "5.15.0-1056.59",
            "linux-ibm-headers-5.15.0-1056": "5.15.0-1056.59",
            "linux-image-unsigned-5.15.0-1056-ibm-dbgsym": "5.15.0-1056.59",
            "linux-modules-5.15.0-1056-ibm": "5.15.0-1056.59",
            "linux-tools-5.15.0-1056-ibm": "5.15.0-1056.59",
            "linux-ibm-cloud-tools-common": "5.15.0-1056.59"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-intel-iotg

Package

Name
linux-intel-iotg
Purl
pkg:deb/ubuntu/linux-intel-iotg@5.15.0-1058.64?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1058.64

Affected versions

5.*

5.15.0-1004.6
5.15.0-1008.11
5.15.0-1010.14
5.15.0-1013.17
5.15.0-1015.20
5.15.0-1016.21
5.15.0-1017.22
5.15.0-1018.23
5.15.0-1021.26
5.15.0-1023.28
5.15.0-1025.30
5.15.0-1026.31
5.15.0-1027.32
5.15.0-1028.33
5.15.0-1030.35
5.15.0-1031.36
5.15.0-1033.38
5.15.0-1034.39
5.15.0-1035.40
5.15.0-1036.41
5.15.0-1037.42
5.15.0-1038.43
5.15.0-1039.45
5.15.0-1040.46
5.15.0-1043.49
5.15.0-1045.51
5.15.0-1046.52
5.15.0-1047.53
5.15.0-1048.54
5.15.0-1049.55
5.15.0-1050.56
5.15.0-1051.57
5.15.0-1052.58
5.15.0-1055.61
5.15.0-1057.63

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-intel-iotg-cloud-tools-5.15.0-1058": "5.15.0-1058.64",
            "linux-cloud-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64",
            "linux-intel-iotg-tools-host": "5.15.0-1058.64",
            "linux-modules-extra-5.15.0-1058-intel-iotg": "5.15.0-1058.64",
            "linux-tools-5.15.0-1058-intel-iotg": "5.15.0-1058.64",
            "linux-modules-5.15.0-1058-intel-iotg": "5.15.0-1058.64",
            "linux-image-unsigned-5.15.0-1058-intel-iotg-dbgsym": "5.15.0-1058.64",
            "linux-intel-iotg-cloud-tools-common": "5.15.0-1058.64",
            "linux-buildinfo-5.15.0-1058-intel-iotg": "5.15.0-1058.64",
            "linux-intel-iotg-tools-common": "5.15.0-1058.64",
            "linux-modules-iwlwifi-5.15.0-1058-intel-iotg": "5.15.0-1058.64",
            "linux-intel-iotg-headers-5.15.0-1058": "5.15.0-1058.64",
            "linux-intel-iotg-tools-5.15.0-1058": "5.15.0-1058.64",
            "linux-image-unsigned-5.15.0-1058-intel-iotg": "5.15.0-1058.64",
            "linux-headers-5.15.0-1058-intel-iotg": "5.15.0-1058.64"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm@5.15.0-1060.65?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1060.65

Affected versions

5.*

5.13.0-1004.4
5.13.0-1006.6+22.04.1
5.13.0-1007.7+22.04.1
5.13.0-1010.11+22.04.1
5.15.0-1002.2
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1007.7
5.15.0-1008.8
5.15.0-1010.11
5.15.0-1012.14
5.15.0-1013.16
5.15.0-1016.19
5.15.0-1017.21
5.15.0-1018.22
5.15.0-1019.23
5.15.0-1020.24
5.15.0-1021.26
5.15.0-1024.29
5.15.0-1025.30
5.15.0-1026.31
5.15.0-1028.33
5.15.0-1029.34
5.15.0-1030.35
5.15.0-1031.36
5.15.0-1032.37
5.15.0-1033.38
5.15.0-1034.39
5.15.0-1035.40
5.15.0-1037.42
5.15.0-1038.43
5.15.0-1039.44
5.15.0-1040.45
5.15.0-1041.46
5.15.0-1042.47
5.15.0-1044.49
5.15.0-1045.50
5.15.0-1046.51
5.15.0-1047.52
5.15.0-1048.53
5.15.0-1049.54
5.15.0-1050.55
5.15.0-1051.56
5.15.0-1052.57
5.15.0-1053.58
5.15.0-1054.59
5.15.0-1057.62
5.15.0-1058.63
5.15.0-1059.64

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-5.15.0-1060-kvm": "5.15.0-1060.65",
            "linux-modules-5.15.0-1060-kvm": "5.15.0-1060.65",
            "linux-image-unsigned-5.15.0-1060-kvm-dbgsym": "5.15.0-1060.65",
            "linux-tools-5.15.0-1060-kvm": "5.15.0-1060.65",
            "linux-kvm-headers-5.15.0-1060": "5.15.0-1060.65",
            "linux-kvm-tools-5.15.0-1060": "5.15.0-1060.65",
            "linux-headers-5.15.0-1060-kvm": "5.15.0-1060.65",
            "linux-image-unsigned-5.15.0-1060-kvm": "5.15.0-1060.65"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency@5.15.0-110.120?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-110.120

Affected versions

5.*

5.15.0-22.22
5.15.0-23.23
5.15.0-24.24
5.15.0-27.28
5.15.0-30.31
5.15.0-33.34
5.15.0-35.36
5.15.0-37.39
5.15.0-39.42
5.15.0-40.43
5.15.0-41.44
5.15.0-43.46
5.15.0-46.49
5.15.0-47.53
5.15.0-48.54
5.15.0-50.56
5.15.0-52.58
5.15.0-53.59
5.15.0-56.62
5.15.0-57.63
5.15.0-58.64
5.15.0-60.66
5.15.0-67.74
5.15.0-69.76
5.15.0-70.77
5.15.0-71.78
5.15.0-72.79
5.15.0-73.80
5.15.0-75.82
5.15.0-76.83
5.15.0-78.85
5.15.0-79.88
5.15.0-82.91
5.15.0-83.92
5.15.0-84.93
5.15.0-86.95
5.15.0-87.96
5.15.0-88.98
5.15.0-89.99
5.15.0-91.101
5.15.0-92.102
5.15.0-94.104
5.15.0-97.107
5.15.0-100.110
5.15.0-101.111
5.15.0-102.112
5.15.0-105.115
5.15.0-106.116
5.15.0-107.117

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-5.15.0-110-lowlatency-64k": "5.15.0-110.120",
            "linux-lowlatency-tools-common": "5.15.0-110.120",
            "linux-buildinfo-5.15.0-110-lowlatency-64k": "5.15.0-110.120",
            "linux-image-unsigned-5.15.0-110-lowlatency-64k": "5.15.0-110.120",
            "linux-headers-5.15.0-110-lowlatency": "5.15.0-110.120",
            "linux-lowlatency-tools-host": "5.15.0-110.120",
            "linux-image-unsigned-5.15.0-110-lowlatency": "5.15.0-110.120",
            "linux-cloud-tools-5.15.0-110-lowlatency": "5.15.0-110.120",
            "linux-lowlatency-cloud-tools-common": "5.15.0-110.120",
            "linux-lowlatency-cloud-tools-5.15.0-110": "5.15.0-110.120",
            "linux-modules-5.15.0-110-lowlatency": "5.15.0-110.120",
            "linux-modules-iwlwifi-5.15.0-110-lowlatency": "5.15.0-110.120",
            "linux-image-unsigned-5.15.0-110-lowlatency-dbgsym": "5.15.0-110.120",
            "linux-lowlatency-tools-5.15.0-110": "5.15.0-110.120",
            "linux-tools-5.15.0-110-lowlatency": "5.15.0-110.120",
            "linux-buildinfo-5.15.0-110-lowlatency": "5.15.0-110.120",
            "linux-lowlatency-headers-5.15.0-110": "5.15.0-110.120",
            "linux-image-unsigned-5.15.0-110-lowlatency-64k-dbgsym": "5.15.0-110.120",
            "linux-headers-5.15.0-110-lowlatency-64k": "5.15.0-110.120",
            "linux-tools-5.15.0-110-lowlatency-64k": "5.15.0-110.120"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-5.19

Package

Name
linux-lowlatency-hwe-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1017.18~22.04.1
5.19.0-1018.19~22.04.1
5.19.0-1021.22~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1024.25~22.04.1
5.19.0-1025.26~22.04.1
5.19.0-1027.28~22.04.1
5.19.0-1028.29~22.04.1
5.19.0-1030.30

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-6.2

Package

Name
linux-lowlatency-hwe-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-6.5

Package

Name
linux-lowlatency-hwe-6.5
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-6.5@6.5.0-41.41.1~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-41.41.1~22.04.1

Affected versions

6.*

6.5.0-14.14.1~22.04.1
6.5.0-15.15.1.1~22.04.1
6.5.0-17.17.1.1.1~22.04.1
6.5.0-21.21.1~22.04.1
6.5.0-25.25.1~22.04.1
6.5.0-26.26.1~22.04.1
6.5.0-27.28.1~22.04.1
6.5.0-28.29.1~22.04.1
6.5.0-35.35.1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-lowlatency-hwe-6.5-cloud-tools-common": "6.5.0-41.41.1~22.04.1",
            "linux-buildinfo-6.5.0-41-lowlatency-64k": "6.5.0-41.41.1~22.04.1",
            "linux-lowlatency-hwe-6.5-tools-6.5.0-41": "6.5.0-41.41.1~22.04.1",
            "linux-lowlatency-hwe-6.5-headers-6.5.0-41": "6.5.0-41.41.1~22.04.1",
            "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-41": "6.5.0-41.41.1~22.04.1",
            "linux-cloud-tools-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1",
            "linux-lowlatency-hwe-6.5-tools-host": "6.5.0-41.41.1~22.04.1",
            "linux-headers-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1",
            "linux-modules-6.5.0-41-lowlatency-64k": "6.5.0-41.41.1~22.04.1",
            "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1",
            "linux-image-unsigned-6.5.0-41-lowlatency-64k-dbgsym": "6.5.0-41.41.1~22.04.1",
            "linux-image-unsigned-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1",
            "linux-headers-6.5.0-41-lowlatency-64k": "6.5.0-41.41.1~22.04.1",
            "linux-image-unsigned-6.5.0-41-lowlatency-dbgsym": "6.5.0-41.41.1~22.04.1",
            "linux-tools-6.5.0-41-lowlatency-64k": "6.5.0-41.41.1~22.04.1",
            "linux-buildinfo-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1",
            "linux-tools-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1",
            "linux-modules-iwlwifi-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1",
            "linux-lowlatency-hwe-6.5-tools-common": "6.5.0-41.41.1~22.04.1",
            "linux-image-unsigned-6.5.0-41-lowlatency-64k": "6.5.0-41.41.1~22.04.1",
            "linux-modules-6.5.0-41-lowlatency": "6.5.0-41.41.1~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-6.8

Package

Name
linux-lowlatency-hwe-6.8
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-6.8@6.8.0-38.38.1~22.04.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-38.38.1~22.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2",
            "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-38": "6.8.0-38.38.1~22.04.2",
            "linux-buildinfo-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2",
            "linux-modules-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2",
            "linux-image-unsigned-6.8.0-38-lowlatency-dbgsym": "6.8.0-38.38.1~22.04.2",
            "linux-image-unsigned-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2",
            "linux-headers-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2",
            "linux-cloud-tools-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2",
            "linux-tools-6.8.0-38-lowlatency-64k": "6.8.0-38.38.1~22.04.2",
            "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2",
            "linux-tools-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2",
            "linux-modules-iwlwifi-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2",
            "linux-buildinfo-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2",
            "linux-lowlatency-hwe-6.8-headers-6.8.0-38": "6.8.0-38.38.1~22.04.2",
            "linux-image-unsigned-6.8.0-38-lowlatency-64k-dbgsym": "6.8.0-38.38.1~22.04.2",
            "linux-image-unsigned-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2",
            "linux-lowlatency-hwe-6.8-tools-6.8.0-38": "6.8.0-38.38.1~22.04.2",
            "linux-headers-6.8.0-38-lowlatency": "6.8.0-38.38.1~22.04.2"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-nvidia

Package

Name
linux-nvidia
Purl
pkg:deb/ubuntu/linux-nvidia@5.15.0-1058.59?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1058.59

Affected versions

5.*

5.15.0-1005.5
5.15.0-1007.7
5.15.0-1010.10
5.15.0-1015.15
5.15.0-1017.17
5.15.0-1018.18
5.15.0-1023.23
5.15.0-1025.25
5.15.0-1026.26
5.15.0-1027.27
5.15.0-1028.28
5.15.0-1029.29
5.15.0-1030.30
5.15.0-1031.31
5.15.0-1032.32
5.15.0-1033.33
5.15.0-1037.37
5.15.0-1039.39
5.15.0-1040.40
5.15.0-1041.41
5.15.0-1042.42
5.15.0-1043.43
5.15.0-1044.44
5.15.0-1045.45
5.15.0-1046.46
5.15.0-1047.47
5.15.0-1048.48
5.15.0-1053.54
5.15.0-1054.55
5.15.0-1055.56

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59",
            "linux-nvidia-cloud-tools-common": "5.15.0-1058.59",
            "linux-modules-extra-5.15.0-1058-nvidia": "5.15.0-1058.59",
            "linux-modules-nvidia-fs-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59",
            "linux-nvidia-tools-5.15.0-1058": "5.15.0-1058.59",
            "linux-nvidia-tools-common": "5.15.0-1058.59",
            "linux-headers-5.15.0-1058-nvidia": "5.15.0-1058.59",
            "linux-image-unsigned-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59",
            "linux-nvidia-headers-5.15.0-1058": "5.15.0-1058.59",
            "linux-tools-5.15.0-1058-nvidia": "5.15.0-1058.59",
            "linux-image-unsigned-5.15.0-1058-nvidia-lowlatency-dbgsym": "5.15.0-1058.59",
            "linux-tools-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59",
            "linux-buildinfo-5.15.0-1058-nvidia": "5.15.0-1058.59",
            "linux-image-unsigned-5.15.0-1058-nvidia-dbgsym": "5.15.0-1058.59",
            "linux-cloud-tools-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59",
            "linux-headers-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59",
            "linux-modules-5.15.0-1058-nvidia": "5.15.0-1058.59",
            "linux-nvidia-cloud-tools-5.15.0-1058": "5.15.0-1058.59",
            "linux-modules-5.15.0-1058-nvidia-lowlatency": "5.15.0-1058.59",
            "linux-modules-nvidia-fs-5.15.0-1058-nvidia": "5.15.0-1058.59",
            "linux-cloud-tools-5.15.0-1058-nvidia": "5.15.0-1058.59",
            "linux-nvidia-tools-host": "5.15.0-1058.59",
            "linux-image-unsigned-5.15.0-1058-nvidia": "5.15.0-1058.59"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-nvidia-6.2

Package

Name
linux-nvidia-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1003.3~22.04.1
6.2.0-1009.9
6.2.0-1010.10
6.2.0-1011.11
6.2.0-1012.12
6.2.0-1013.13
6.2.0-1015.15

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-nvidia-6.5

Package

Name
linux-nvidia-6.5
Purl
pkg:deb/ubuntu/linux-nvidia-6.5@6.5.0-1021.22?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-1021.22

Affected versions

6.*

6.5.0-1004.4
6.5.0-1007.7
6.5.0-1013.13
6.5.0-1014.14
6.5.0-1015.15
6.5.0-1018.18
6.5.0-1019.19

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-6.5.0-1021-nvidia": "6.5.0-1021.22",
            "linux-modules-extra-6.5.0-1021-nvidia": "6.5.0-1021.22",
            "linux-tools-6.5.0-1021-nvidia": "6.5.0-1021.22",
            "linux-image-unsigned-6.5.0-1021-nvidia-64k": "6.5.0-1021.22",
            "linux-buildinfo-6.5.0-1021-nvidia-64k": "6.5.0-1021.22",
            "linux-modules-6.5.0-1021-nvidia": "6.5.0-1021.22",
            "linux-modules-nvidia-fs-6.5.0-1021-nvidia": "6.5.0-1021.22",
            "linux-image-unsigned-6.5.0-1021-nvidia": "6.5.0-1021.22",
            "linux-image-unsigned-6.5.0-1021-nvidia-dbgsym": "6.5.0-1021.22",
            "linux-tools-6.5.0-1021-nvidia-64k": "6.5.0-1021.22",
            "linux-modules-6.5.0-1021-nvidia-64k": "6.5.0-1021.22",
            "linux-headers-6.5.0-1021-nvidia": "6.5.0-1021.22",
            "linux-nvidia-6.5-headers-6.5.0-1021": "6.5.0-1021.22",
            "linux-modules-nvidia-fs-6.5.0-1021-nvidia-64k": "6.5.0-1021.22",
            "linux-nvidia-6.5-tools-6.5.0-1021": "6.5.0-1021.22",
            "linux-nvidia-6.5-tools-host": "6.5.0-1021.22",
            "linux-headers-6.5.0-1021-nvidia-64k": "6.5.0-1021.22",
            "linux-image-unsigned-6.5.0-1021-nvidia-64k-dbgsym": "6.5.0-1021.22"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-nvidia-6.8

Package

Name
linux-nvidia-6.8
Purl
pkg:deb/ubuntu/linux-nvidia-6.8@6.8.0-1008.8~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1008.8~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1",
            "linux-nvidia-6.8-tools-6.8.0-1008": "6.8.0-1008.8~22.04.1",
            "linux-image-unsigned-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1",
            "linux-buildinfo-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1",
            "linux-image-unsigned-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1",
            "linux-modules-extra-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1",
            "linux-modules-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1",
            "linux-modules-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1",
            "linux-headers-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1",
            "linux-nvidia-6.8-headers-6.8.0-1008": "6.8.0-1008.8~22.04.1",
            "linux-headers-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1",
            "linux-modules-nvidia-fs-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1",
            "linux-nvidia-6.8-tools-host": "6.8.0-1008.8~22.04.1",
            "linux-image-unsigned-6.8.0-1008-nvidia-dbgsym": "6.8.0-1008.8~22.04.1",
            "linux-tools-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1",
            "linux-tools-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1",
            "linux-buildinfo-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1",
            "linux-image-unsigned-6.8.0-1008-nvidia-64k-dbgsym": "6.8.0-1008.8~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-oem-5.17

Package

Name
linux-oem-5.17

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.17.0-1003.3
5.17.0-1004.4
5.17.0-1006.6
5.17.0-1011.12
5.17.0-1012.13
5.17.0-1013.14
5.17.0-1014.15
5.17.0-1015.16
5.17.0-1016.17
5.17.0-1017.18
5.17.0-1018.19
5.17.0-1019.20
5.17.0-1020.21
5.17.0-1021.22
5.17.0-1024.25
5.17.0-1025.26
5.17.0-1026.27
5.17.0-1027.28
5.17.0-1028.29
5.17.0-1029.30
5.17.0-1030.31
5.17.0-1031.32
5.17.0-1032.33
5.17.0-1033.34
5.17.0-1034.35
5.17.0-1035.36

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-oem-6.0

Package

Name
linux-oem-6.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.0.0-1006.6
6.0.0-1007.7
6.0.0-1008.8
6.0.0-1009.9
6.0.0-1010.10
6.0.0-1011.11
6.0.0-1012.12
6.0.0-1013.13
6.0.0-1014.14
6.0.0-1015.15
6.0.0-1016.16
6.0.0-1017.17
6.0.0-1018.18
6.0.0-1019.19
6.0.0-1020.20
6.0.0-1021.21

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-oem-6.1

Package

Name
linux-oem-6.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.1.0-1004.4
6.1.0-1006.6
6.1.0-1007.7
6.1.0-1008.8
6.1.0-1009.9
6.1.0-1010.10
6.1.0-1012.12
6.1.0-1013.13
6.1.0-1014.14
6.1.0-1015.15
6.1.0-1016.16
6.1.0-1017.17
6.1.0-1019.19
6.1.0-1020.20
6.1.0-1021.21
6.1.0-1022.22
6.1.0-1023.23
6.1.0-1024.24
6.1.0-1025.25
6.1.0-1026.26
6.1.0-1027.27
6.1.0-1028.28
6.1.0-1029.29
6.1.0-1033.33
6.1.0-1034.34
6.1.0-1035.35
6.1.0-1036.36

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-oem-6.5

Package

Name
linux-oem-6.5
Purl
pkg:deb/ubuntu/linux-oem-6.5@6.5.0-1024.25?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-1024.25

Affected versions

6.*

6.5.0-1003.3
6.5.0-1004.4
6.5.0-1006.6
6.5.0-1007.7
6.5.0-1008.8
6.5.0-1009.10
6.5.0-1011.12
6.5.0-1013.14
6.5.0-1014.15
6.5.0-1015.16
6.5.0-1016.17
6.5.0-1018.19
6.5.0-1019.20
6.5.0-1020.21
6.5.0-1022.23
6.5.0-1023.24

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-buildinfo-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-headers-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-modules-iwlwifi-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-modules-usbio-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-modules-ipu6-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-oem-6.5-lib-rust-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-oem-6.5-tools-6.5.0-1024": "6.5.0-1024.25",
            "linux-modules-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-oem-6.5-tools-host": "6.5.0-1024.25",
            "linux-image-unsigned-6.5.0-1024-oem-dbgsym": "6.5.0-1024.25",
            "linux-oem-6.5-headers-6.5.0-1024": "6.5.0-1024.25",
            "linux-modules-ivsc-6.5.0-1024-oem": "6.5.0-1024.25",
            "linux-tools-6.5.0-1024-oem": "6.5.0-1024.25"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle@5.15.0-1061.67?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1061.67

Affected versions

5.*

5.13.0-1008.10
5.15.0-1001.3
5.15.0-1002.4
5.15.0-1003.5
5.15.0-1006.8
5.15.0-1007.9
5.15.0-1009.12
5.15.0-1011.15
5.15.0-1013.17
5.15.0-1016.20
5.15.0-1017.22
5.15.0-1018.23
5.15.0-1019.24
5.15.0-1021.27
5.15.0-1022.28
5.15.0-1025.31
5.15.0-1026.32
5.15.0-1027.33
5.15.0-1029.35
5.15.0-1030.36
5.15.0-1032.38
5.15.0-1033.39
5.15.0-1034.40
5.15.0-1035.41
5.15.0-1036.42
5.15.0-1037.43
5.15.0-1038.44
5.15.0-1039.45
5.15.0-1040.46
5.15.0-1041.47
5.15.0-1042.48
5.15.0-1044.50
5.15.0-1045.51
5.15.0-1046.52
5.15.0-1047.53
5.15.0-1048.54
5.15.0-1049.55
5.15.0-1050.56
5.15.0-1051.57
5.15.0-1052.58
5.15.0-1053.59
5.15.0-1054.60
5.15.0-1055.61
5.15.0-1058.64
5.15.0-1059.65
5.15.0-1060.66

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-unsigned-5.15.0-1061-oracle-dbgsym": "5.15.0-1061.67",
            "linux-oracle-tools-5.15.0-1061": "5.15.0-1061.67",
            "linux-modules-extra-5.15.0-1061-oracle": "5.15.0-1061.67",
            "linux-buildinfo-5.15.0-1061-oracle": "5.15.0-1061.67",
            "linux-headers-5.15.0-1061-oracle": "5.15.0-1061.67",
            "linux-modules-5.15.0-1061-oracle": "5.15.0-1061.67",
            "linux-tools-5.15.0-1061-oracle": "5.15.0-1061.67",
            "linux-oracle-headers-5.15.0-1061": "5.15.0-1061.67",
            "linux-image-unsigned-5.15.0-1061-oracle": "5.15.0-1061.67"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-oracle-6.5

Package

Name
linux-oracle-6.5
Purl
pkg:deb/ubuntu/linux-oracle-6.5@6.5.0-1024.24~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-1024.24~22.04.1

Affected versions

6.*

6.5.0-1013.13~22.04.4
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1018.18~22.04.1
6.5.0-1019.19~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1021.21~22.04.1
6.5.0-1023.23~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-6.5.0-1024-oracle": "6.5.0-1024.24~22.04.1",
            "linux-headers-6.5.0-1024-oracle-64k": "6.5.0-1024.24~22.04.1",
            "linux-headers-6.5.0-1024-oracle": "6.5.0-1024.24~22.04.1",
            "linux-image-unsigned-6.5.0-1024-oracle-64k": "6.5.0-1024.24~22.04.1",
            "linux-image-unsigned-6.5.0-1024-oracle": "6.5.0-1024.24~22.04.1",
            "linux-oracle-6.5-headers-6.5.0-1024": "6.5.0-1024.24~22.04.1",
            "linux-oracle-6.5-tools-6.5.0-1024": "6.5.0-1024.24~22.04.1",
            "linux-image-unsigned-6.5.0-1024-oracle-64k-dbgsym": "6.5.0-1024.24~22.04.1",
            "linux-buildinfo-6.5.0-1024-oracle-64k": "6.5.0-1024.24~22.04.1",
            "linux-tools-6.5.0-1024-oracle": "6.5.0-1024.24~22.04.1",
            "linux-tools-6.5.0-1024-oracle-64k": "6.5.0-1024.24~22.04.1",
            "linux-image-unsigned-6.5.0-1024-oracle-dbgsym": "6.5.0-1024.24~22.04.1",
            "linux-modules-extra-6.5.0-1024-oracle-64k": "6.5.0-1024.24~22.04.1",
            "linux-modules-6.5.0-1024-oracle-64k": "6.5.0-1024.24~22.04.1",
            "linux-modules-extra-6.5.0-1024-oracle": "6.5.0-1024.24~22.04.1",
            "linux-modules-6.5.0-1024-oracle": "6.5.0-1024.24~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@5.15.0-1058.61?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1058.61

Affected versions

5.*

5.13.0-1008.9
5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1008.8
5.15.0-1011.13
5.15.0-1012.14
5.15.0-1013.15
5.15.0-1014.16
5.15.0-1015.17
5.15.0-1016.18
5.15.0-1017.19
5.15.0-1018.20
5.15.0-1021.23
5.15.0-1022.24
5.15.0-1023.25
5.15.0-1024.26
5.15.0-1025.27
5.15.0-1026.28
5.15.0-1027.29
5.15.0-1028.30
5.15.0-1029.31
5.15.0-1030.32
5.15.0-1032.35
5.15.0-1033.36
5.15.0-1034.37
5.15.0-1035.38
5.15.0-1036.39
5.15.0-1037.40
5.15.0-1038.41
5.15.0-1040.43
5.15.0-1041.44
5.15.0-1042.45
5.15.0-1043.46
5.15.0-1044.47
5.15.0-1045.48
5.15.0-1046.49
5.15.0-1047.50
5.15.0-1048.51
5.15.0-1049.52
5.15.0-1050.53
5.15.0-1053.56
5.15.0-1054.57
5.15.0-1055.58

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-5.15.0-1058-raspi-dbgsym": "5.15.0-1058.61",
            "linux-modules-extra-5.15.0-1058-raspi": "5.15.0-1058.61",
            "linux-tools-5.15.0-1058-raspi": "5.15.0-1058.61",
            "linux-buildinfo-5.15.0-1058-raspi": "5.15.0-1058.61",
            "linux-raspi-tools-5.15.0-1058": "5.15.0-1058.61",
            "linux-image-5.15.0-1058-raspi": "5.15.0-1058.61",
            "linux-modules-5.15.0-1058-raspi": "5.15.0-1058.61",
            "linux-headers-5.15.0-1058-raspi": "5.15.0-1058.61",
            "linux-raspi-headers-5.15.0-1058": "5.15.0-1058.61"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-realtime

Package

Name
linux-realtime

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.15.0-1032.35

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-riscv

Package

Name
linux-riscv

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1004.4
5.13.0-1006.6+22.04.1
5.13.0-1007.7+22.04.1
5.13.0-1010.11+22.04.1
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1007.7
5.15.0-1008.8
5.15.0-1011.12
5.15.0-1012.13
5.15.0-1014.16
5.15.0-1015.17
5.15.0-1016.18
5.15.0-1017.19
5.15.0-1018.21
5.15.0-1019.22
5.15.0-1020.23
5.15.0-1022.26
5.15.0-1023.27
5.15.0-1026.30
5.15.0-1027.31
5.15.0-1028.32

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-riscv-5.19

Package

Name
linux-riscv-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1012.13~22.04.1
5.19.0-1015.16~22.04.1
5.19.0-1016.17~22.04.1
5.19.0-1017.18~22.04.1
5.19.0-1018.19~22.04.1
5.19.0-1019.21~22.04.1
5.19.0-1020.22~22.04.1
5.19.0-1021.23~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-riscv-6.5

Package

Name
linux-riscv-6.5
Purl
pkg:deb/ubuntu/linux-riscv-6.5@6.5.0-40.40.1~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-40.40.1~22.04.1

Affected versions

6.*

6.5.0-17.17.1.1~22.04.1
6.5.0-21.21.1~22.04.1
6.5.0-25.25.1~22.04.1
6.5.0-26.26.1~22.04.1
6.5.0-27.28.1~22.04.1
6.5.0-28.29.1~22.04.1
6.5.0-35.35.1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-headers-6.5.0-40-generic": "6.5.0-40.40.1~22.04.1",
            "linux-riscv-6.5-tools-6.5.0-40": "6.5.0-40.40.1~22.04.1",
            "linux-modules-extra-6.5.0-40-generic": "6.5.0-40.40.1~22.04.1",
            "linux-image-6.5.0-40-generic-dbgsym": "6.5.0-40.40.1~22.04.1",
            "linux-riscv-6.5-headers-6.5.0-40": "6.5.0-40.40.1~22.04.1",
            "linux-tools-6.5.0-40-generic": "6.5.0-40.40.1~22.04.1",
            "linux-image-6.5.0-40-generic": "6.5.0-40.40.1~22.04.1",
            "linux-modules-6.5.0-40-generic": "6.5.0-40.40.1~22.04.1",
            "linux-buildinfo-6.5.0-40-generic": "6.5.0-40.40.1~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-riscv-6.8

Package

Name
linux-riscv-6.8
Purl
pkg:deb/ubuntu/linux-riscv-6.8@6.8.0-38.38.1~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-38.38.1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-headers-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1",
            "linux-modules-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1",
            "linux-riscv-6.8-tools-6.8.0-38": "6.8.0-38.38.1~22.04.1",
            "linux-image-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1",
            "linux-riscv-6.8-headers-6.8.0-38": "6.8.0-38.38.1~22.04.1",
            "linux-image-6.8.0-38-generic-dbgsym": "6.8.0-38.38.1~22.04.1",
            "linux-buildinfo-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1",
            "linux-tools-6.8.0-38-generic": "6.8.0-38.38.1~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-starfive-5.19

Package

Name
linux-starfive-5.19

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1014.16~22.04.1
5.19.0-1015.17~22.04.1
5.19.0-1016.18~22.04.1
5.19.0-1017.19~22.04.1
5.19.0-1018.20~22.04.1
5.19.0-1019.21~22.04.1
5.19.0-1020.22~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-starfive-6.2

Package

Name
linux-starfive-6.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1006.7~22.04.1
6.2.0-1007.8~22.04.1
6.2.0-1009.10~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-starfive-6.5

Package

Name
linux-starfive-6.5
Purl
pkg:deb/ubuntu/linux-starfive-6.5@6.5.0-1015.16~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0-1015.16~22.04.1

Affected versions

6.*

6.5.0-1007.8~22.04.1
6.5.0-1008.9~22.04.1
6.5.0-1009.10~22.04.1
6.5.0-1010.11~22.04.1
6.5.0-1011.12~22.04.1
6.5.0-1012.13~22.04.1
6.5.0-1014.15~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-extra-6.5.0-1015-starfive": "6.5.0-1015.16~22.04.1",
            "linux-headers-6.5.0-1015-starfive": "6.5.0-1015.16~22.04.1",
            "linux-starfive-6.5-headers-6.5.0-1015": "6.5.0-1015.16~22.04.1",
            "linux-starfive-6.5-tools-6.5.0-1015": "6.5.0-1015.16~22.04.1",
            "linux-tools-6.5.0-1015-starfive": "6.5.0-1015.16~22.04.1",
            "linux-modules-6.5.0-1015-starfive": "6.5.0-1015.16~22.04.1",
            "linux-buildinfo-6.5.0-1015-starfive": "6.5.0-1015.16~22.04.1",
            "linux-image-6.5.0-1015-starfive": "6.5.0-1015.16~22.04.1",
            "linux-image-6.5.0-1015-starfive-dbgsym": "6.5.0-1015.16~22.04.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:22.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp@5.15.0-1030.34?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1030.34

Affected versions

5.*

5.15.0-1022.26
5.15.0-1023.27
5.15.0-1025.29
5.15.0-1027.31

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34",
            "linux-xilinx-zynqmp-tools-5.15.0-1030": "5.15.0-1030.34",
            "linux-xilinx-zynqmp-tools-host": "5.15.0-1030.34",
            "linux-tools-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34",
            "linux-image-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34",
            "linux-xilinx-zynqmp-headers-5.15.0-1030": "5.15.0-1030.34",
            "linux-headers-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34",
            "linux-xilinx-zynqmp-tools-common": "5.15.0-1030.34",
            "linux-modules-5.15.0-1030-xilinx-zynqmp": "5.15.0-1030.34",
            "linux-image-5.15.0-1030-xilinx-zynqmp-dbgsym": "5.15.0-1030.34"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux@6.8.0-20.20?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-20.20

Affected versions

6.*

6.5.0-9.9
6.6.0-14.14
6.8.0-11.11

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-cloud-tools-common": "6.8.0-20.20",
            "linux-headers-6.8.0-20": "6.8.0-20.20",
            "linux-modules-6.8.0-20-generic": "6.8.0-20.20",
            "linux-tools-6.8.0-20": "6.8.0-20.20",
            "linux-libc-dev": "6.8.0-20.20",
            "linux-cloud-tools-6.8.0-20": "6.8.0-20.20",
            "linux-source-6.8.0": "6.8.0-20.20",
            "linux-image-6.8.0-20-generic": "6.8.0-20.20",
            "linux-doc": "6.8.0-20.20",
            "linux-image-unsigned-6.8.0-20-generic": "6.8.0-20.20",
            "linux-headers-6.8.0-20-generic-64k": "6.8.0-20.20",
            "linux-headers-6.8.0-20-generic": "6.8.0-20.20",
            "linux-modules-extra-6.8.0-20-generic": "6.8.0-20.20",
            "linux-cloud-tools-6.8.0-20-generic": "6.8.0-20.20",
            "linux-tools-6.8.0-20-generic": "6.8.0-20.20",
            "linux-image-unsigned-6.8.0-20-generic-64k-dbgsym": "6.8.0-20.20",
            "linux-lib-rust-6.8.0-20-generic": "6.8.0-20.20",
            "linux-image-unsigned-6.8.0-20-generic-64k": "6.8.0-20.20",
            "linux-tools-host": "6.8.0-20.20",
            "linux-modules-iwlwifi-6.8.0-20-generic": "6.8.0-20.20",
            "linux-image-6.8.0-20-generic-dbgsym": "6.8.0-20.20",
            "linux-modules-6.8.0-20-generic-64k": "6.8.0-20.20",
            "linux-buildinfo-6.8.0-20-generic": "6.8.0-20.20",
            "linux-modules-ivsc-6.8.0-20-generic": "6.8.0-20.20",
            "linux-image-unsigned-6.8.0-20-generic-dbgsym": "6.8.0-20.20",
            "linux-tools-6.8.0-20-generic-64k": "6.8.0-20.20",
            "linux-modules-ipu6-6.8.0-20-generic": "6.8.0-20.20",
            "linux-buildinfo-6.8.0-20-generic-64k": "6.8.0-20.20",
            "linux-tools-common": "6.8.0-20.20"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws@6.8.0-1006.6?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1006.6

Affected versions

6.*

6.5.0-1008.8
6.6.0-1001.1
6.8.0-1001.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-tools-6.8.0-1006-aws": "6.8.0-1006.6",
            "linux-modules-6.8.0-1006-aws": "6.8.0-1006.6",
            "linux-aws-cloud-tools-6.8.0-1006": "6.8.0-1006.6",
            "linux-buildinfo-6.8.0-1006-aws": "6.8.0-1006.6",
            "linux-cloud-tools-6.8.0-1006-aws": "6.8.0-1006.6",
            "linux-headers-6.8.0-1006-aws": "6.8.0-1006.6",
            "linux-modules-extra-6.8.0-1006-aws": "6.8.0-1006.6",
            "linux-image-unsigned-6.8.0-1006-aws": "6.8.0-1006.6",
            "linux-aws-headers-6.8.0-1006": "6.8.0-1006.6",
            "linux-image-unsigned-6.8.0-1006-aws-dbgsym": "6.8.0-1006.6",
            "linux-aws-tools-6.8.0-1006": "6.8.0-1006.6"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@6.8.0-1005.5?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1005.5

Affected versions

6.*

6.5.0-1007.7
6.6.0-1001.1
6.8.0-1001.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-azure-cloud-tools-6.8.0-1005": "6.8.0-1005.5",
            "linux-modules-6.8.0-1005-azure": "6.8.0-1005.5",
            "linux-modules-iwlwifi-6.8.0-1005-azure": "6.8.0-1005.5",
            "linux-azure-headers-6.8.0-1005": "6.8.0-1005.5",
            "linux-image-unsigned-6.8.0-1005-azure": "6.8.0-1005.5",
            "linux-headers-6.8.0-1005-azure": "6.8.0-1005.5",
            "linux-azure-tools-6.8.0-1005": "6.8.0-1005.5",
            "linux-image-unsigned-6.8.0-1005-azure-dbgsym": "6.8.0-1005.5",
            "linux-tools-6.8.0-1005-azure": "6.8.0-1005.5",
            "linux-buildinfo-6.8.0-1005-azure": "6.8.0-1005.5",
            "linux-modules-extra-6.8.0-1005-azure": "6.8.0-1005.5",
            "linux-cloud-tools-6.8.0-1005-azure": "6.8.0-1005.5"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp@6.8.0-1005.5?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1005.5

Affected versions

6.*

6.5.0-1007.7
6.6.0-1001.1
6.8.0-1002.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-6.8.0-1005-gcp": "6.8.0-1005.5",
            "linux-headers-6.8.0-1005-gcp": "6.8.0-1005.5",
            "linux-image-unsigned-6.8.0-1005-gcp": "6.8.0-1005.5",
            "linux-tools-6.8.0-1005-gcp": "6.8.0-1005.5",
            "linux-gcp-tools-6.8.0-1005": "6.8.0-1005.5",
            "linux-modules-extra-6.8.0-1005-gcp": "6.8.0-1005.5",
            "linux-gcp-headers-6.8.0-1005": "6.8.0-1005.5",
            "linux-modules-iwlwifi-6.8.0-1005-gcp": "6.8.0-1005.5",
            "linux-image-unsigned-6.8.0-1005-gcp-dbgsym": "6.8.0-1005.5",
            "linux-modules-6.8.0-1005-gcp": "6.8.0-1005.5"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke@6.8.0-1003.5?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1003.5

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-6.8.0-1003-gke": "6.8.0-1003.5",
            "linux-gke-tools-6.8.0-1003": "6.8.0-1003.5",
            "linux-modules-extra-6.8.0-1003-gke": "6.8.0-1003.5",
            "linux-image-unsigned-6.8.0-1003-gke-dbgsym": "6.8.0-1003.5",
            "linux-headers-6.8.0-1003-gke": "6.8.0-1003.5",
            "linux-tools-6.8.0-1003-gke": "6.8.0-1003.5",
            "linux-gke-headers-6.8.0-1003": "6.8.0-1003.5",
            "linux-modules-6.8.0-1003-gke": "6.8.0-1003.5",
            "linux-image-unsigned-6.8.0-1003-gke": "6.8.0-1003.5"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-ibm

Package

Name
linux-ibm
Purl
pkg:deb/ubuntu/linux-ibm@6.8.0-1003.3?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1003.3

Affected versions

6.*

6.5.0-1009.9
6.8.0-1001.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-headers-6.8.0-1003-ibm": "6.8.0-1003.3",
            "linux-ibm-tools-common": "6.8.0-1003.3",
            "linux-ibm-headers-6.8.0-1003": "6.8.0-1003.3",
            "linux-modules-extra-6.8.0-1003-ibm": "6.8.0-1003.3",
            "linux-ibm-source-6.8.0": "6.8.0-1003.3",
            "linux-tools-6.8.0-1003-ibm": "6.8.0-1003.3",
            "linux-image-unsigned-6.8.0-1003-ibm-dbgsym": "6.8.0-1003.3",
            "linux-ibm-tools-6.8.0-1003": "6.8.0-1003.3",
            "linux-modules-6.8.0-1003-ibm": "6.8.0-1003.3",
            "linux-modules-iwlwifi-6.8.0-1003-ibm": "6.8.0-1003.3",
            "linux-buildinfo-6.8.0-1003-ibm": "6.8.0-1003.3",
            "linux-image-unsigned-6.8.0-1003-ibm": "6.8.0-1003.3",
            "linux-ibm-cloud-tools-common": "6.8.0-1003.3"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency@6.8.0-25.25.3?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-25.25.3

Affected versions

6.*

6.5.0-9.9.1
6.6.0-14.14.1
6.8.0-7.7.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-tools-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3",
            "linux-modules-6.8.0-25-lowlatency": "6.8.0-25.25.3",
            "linux-headers-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3",
            "linux-lowlatency-tools-common": "6.8.0-25.25.3",
            "linux-buildinfo-6.8.0-25-lowlatency": "6.8.0-25.25.3",
            "linux-image-unsigned-6.8.0-25-lowlatency": "6.8.0-25.25.3",
            "linux-lowlatency-lib-rust-6.8.0-25-lowlatency": "6.8.0-25.25.3",
            "linux-lowlatency-cloud-tools-6.8.0-25": "6.8.0-25.25.3",
            "linux-lowlatency-cloud-tools-common": "6.8.0-25.25.3",
            "linux-lowlatency-tools-host": "6.8.0-25.25.3",
            "linux-headers-6.8.0-25-lowlatency": "6.8.0-25.25.3",
            "linux-lowlatency-tools-6.8.0-25": "6.8.0-25.25.3",
            "linux-cloud-tools-6.8.0-25-lowlatency": "6.8.0-25.25.3",
            "linux-modules-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3",
            "linux-tools-6.8.0-25-lowlatency": "6.8.0-25.25.3",
            "linux-image-unsigned-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3",
            "linux-lowlatency-headers-6.8.0-25": "6.8.0-25.25.3",
            "linux-image-unsigned-6.8.0-25-lowlatency-64k-dbgsym": "6.8.0-25.25.3",
            "linux-image-unsigned-6.8.0-25-lowlatency-dbgsym": "6.8.0-25.25.3",
            "linux-buildinfo-6.8.0-25-lowlatency-64k": "6.8.0-25.25.3",
            "linux-modules-iwlwifi-6.8.0-25-lowlatency": "6.8.0-25.25.3"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-nvidia

Package

Name
linux-nvidia
Purl
pkg:deb/ubuntu/linux-nvidia@6.8.0-1007.7?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1007.7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-nvidia-fs-6.8.0-1007-nvidia": "6.8.0-1007.7",
            "linux-headers-6.8.0-1007-nvidia": "6.8.0-1007.7",
            "linux-image-unsigned-6.8.0-1007-nvidia-dbgsym": "6.8.0-1007.7",
            "linux-buildinfo-6.8.0-1007-nvidia-64k": "6.8.0-1007.7",
            "linux-modules-6.8.0-1007-nvidia-64k": "6.8.0-1007.7",
            "linux-tools-6.8.0-1007-nvidia-64k": "6.8.0-1007.7",
            "linux-tools-6.8.0-1007-nvidia": "6.8.0-1007.7",
            "linux-image-unsigned-6.8.0-1007-nvidia-64k-dbgsym": "6.8.0-1007.7",
            "linux-headers-6.8.0-1007-nvidia-64k": "6.8.0-1007.7",
            "linux-modules-6.8.0-1007-nvidia": "6.8.0-1007.7",
            "linux-buildinfo-6.8.0-1007-nvidia": "6.8.0-1007.7",
            "linux-nvidia-tools-6.8.0-1007": "6.8.0-1007.7",
            "linux-modules-extra-6.8.0-1007-nvidia": "6.8.0-1007.7",
            "linux-image-unsigned-6.8.0-1007-nvidia-64k": "6.8.0-1007.7",
            "linux-nvidia-headers-6.8.0-1007": "6.8.0-1007.7",
            "linux-image-unsigned-6.8.0-1007-nvidia": "6.8.0-1007.7",
            "linux-nvidia-tools-host": "6.8.0-1007.7",
            "linux-modules-nvidia-fs-6.8.0-1007-nvidia-64k": "6.8.0-1007.7"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-nvidia-lowlatency

Package

Name
linux-nvidia-lowlatency
Purl
pkg:deb/ubuntu/linux-nvidia-lowlatency@6.8.0-1009.9.1?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1009.9.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-nvidia-lowlatency-tools-host": "6.8.0-1009.9.1",
            "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1",
            "linux-tools-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1",
            "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1",
            "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1",
            "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-dbgsym": "6.8.0-1009.9.1",
            "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k-dbgsym": "6.8.0-1009.9.1",
            "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1",
            "linux-modules-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1",
            "linux-modules-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1",
            "linux-headers-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1",
            "linux-modules-extra-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1",
            "linux-buildinfo-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1",
            "linux-buildinfo-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1",
            "linux-headers-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1",
            "linux-nvidia-lowlatency-tools-6.8.0-1009": "6.8.0-1009.9.1",
            "linux-tools-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1",
            "linux-nvidia-lowlatency-headers-6.8.0-1009": "6.8.0-1009.9.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-oem-6.8

Package

Name
linux-oem-6.8
Purl
pkg:deb/ubuntu/linux-oem-6.8@6.8.0-1003.3?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1003.3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-modules-ivsc-6.8.0-1003-oem": "6.8.0-1003.3",
            "linux-oem-6.8-tools-6.8.0-1003": "6.8.0-1003.3",
            "linux-image-unsigned-6.8.0-1003-oem-dbgsym": "6.8.0-1003.3",
            "linux-headers-6.8.0-1003-oem": "6.8.0-1003.3",
            "linux-oem-6.8-headers-6.8.0-1003": "6.8.0-1003.3",
            "linux-tools-6.8.0-1003-oem": "6.8.0-1003.3",
            "linux-image-unsigned-6.8.0-1003-oem": "6.8.0-1003.3",
            "linux-modules-ipu6-6.8.0-1003-oem": "6.8.0-1003.3",
            "linux-modules-iwlwifi-6.8.0-1003-oem": "6.8.0-1003.3",
            "linux-buildinfo-6.8.0-1003-oem": "6.8.0-1003.3",
            "linux-modules-6.8.0-1003-oem": "6.8.0-1003.3"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle@6.8.0-1004.4?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1004.4

Affected versions

6.*

6.5.0-1010.10
6.6.0-1001.1
6.8.0-1001.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-6.8.0-1004-oracle": "6.8.0-1004.4",
            "linux-tools-6.8.0-1004-oracle": "6.8.0-1004.4",
            "linux-image-unsigned-6.8.0-1004-oracle-dbgsym": "6.8.0-1004.4",
            "linux-image-unsigned-6.8.0-1004-oracle-64k-dbgsym": "6.8.0-1004.4",
            "linux-buildinfo-6.8.0-1004-oracle-64k": "6.8.0-1004.4",
            "linux-image-unsigned-6.8.0-1004-oracle": "6.8.0-1004.4",
            "linux-headers-6.8.0-1004-oracle-64k": "6.8.0-1004.4",
            "linux-modules-extra-6.8.0-1004-oracle": "6.8.0-1004.4",
            "linux-oracle-tools-6.8.0-1004": "6.8.0-1004.4",
            "linux-tools-6.8.0-1004-oracle-64k": "6.8.0-1004.4",
            "linux-modules-6.8.0-1004-oracle": "6.8.0-1004.4",
            "linux-modules-6.8.0-1004-oracle-64k": "6.8.0-1004.4",
            "linux-modules-extra-6.8.0-1004-oracle-64k": "6.8.0-1004.4",
            "linux-modules-iwlwifi-6.8.0-1004-oracle": "6.8.0-1004.4",
            "linux-headers-6.8.0-1004-oracle": "6.8.0-1004.4",
            "linux-oracle-headers-6.8.0-1004": "6.8.0-1004.4",
            "linux-image-unsigned-6.8.0-1004-oracle-64k": "6.8.0-1004.4"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@6.8.0-1002.2?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1002.2

Affected versions

6.*

6.5.0-1005.7
6.7.0-1001.1
6.8.0-1001.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-image-6.8.0-1002-raspi": "6.8.0-1002.2",
            "linux-buildinfo-6.8.0-1002-raspi": "6.8.0-1002.2",
            "linux-tools-6.8.0-1002-raspi": "6.8.0-1002.2",
            "linux-headers-6.8.0-1002-raspi": "6.8.0-1002.2",
            "linux-raspi-headers-6.8.0-1002": "6.8.0-1002.2",
            "linux-modules-6.8.0-1002-raspi": "6.8.0-1002.2",
            "linux-image-6.8.0-1002-raspi-dbgsym": "6.8.0-1002.2",
            "linux-raspi-tools-6.8.0-1002": "6.8.0-1002.2"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}

Ubuntu:24.04:LTS / linux-riscv

Package

Name
linux-riscv
Purl
pkg:deb/ubuntu/linux-riscv@6.8.0-20.20.1?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-20.20.1

Affected versions

6.*

6.5.0-9.9.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "linux-buildinfo-6.8.0-20-generic": "6.8.0-20.20.1",
            "linux-riscv-headers-6.8.0-20": "6.8.0-20.20.1",
            "linux-image-6.8.0-20-generic": "6.8.0-20.20.1",
            "linux-modules-6.8.0-20-generic": "6.8.0-20.20.1",
            "linux-riscv-tools-6.8.0-20": "6.8.0-20.20.1",
            "linux-tools-6.8.0-20-generic": "6.8.0-20.20.1",
            "linux-image-6.8.0-20-generic-dbgsym": "6.8.0-20.20.1",
            "linux-headers-6.8.0-20-generic": "6.8.0-20.20.1"
        }
    ],
    "priority_reason": "An attacker might elevate privileges by winning the race condition."
}