UBUNTU-CVE-2024-26832

Source
https://ubuntu.com/security/CVE-2024-26832
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2024-26832
Upstream
Published
2024-04-17T10:15:00Z
Modified
2025-10-24T05:08:23Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: mm: zswap: fix missing folio cleanup in writeback race path In zswapwritebackentry(), after we get a folio from _readswapcacheasync(), we grab the tree lock again to check that the swap entry was not invalidated and recycled. If it was, we delete the folio we just added to the swap cache and exit. However, _readswapcacheasync() returns the folio locked when it is newly allocated, which is always true for this path, and the folio is ref'd. Make sure to unlock and put the folio before returning. This was discovered by code inspection, probably because this path handles a race condition that should not happen often, and the bug would not crash the system, it will only strand the folio indefinitely.

References

Affected packages

Ubuntu:16.04:LTS

linux-hwe-edge

Package

Name
linux-hwe-edge
Purl
pkg:deb/ubuntu/linux-hwe-edge@4.15.0-23.25~16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.8.0-28.30~16.04.1
4.8.0-30.32~16.04.1
4.8.0-32.34~16.04.1
4.8.0-34.36~16.04.1
4.10.0-14.16~16.04.1
4.10.0-19.21~16.04.1
4.10.0-20.22~16.04.1
4.10.0-21.23~16.04.1
4.10.0-22.24~16.04.1
4.10.0-24.28~16.04.1
4.10.0-26.30~16.04.1
4.11.0-13.19~16.04.1
4.11.0-14.20~16.04.1
4.13.0-16.19~16.04.3
4.13.0-17.20~16.04.1
4.13.0-19.22~16.04.1
4.13.0-21.24~16.04.1
4.13.0-25.29~16.04.2
4.15.0-13.14~16.04.1
4.15.0-15.16~16.04.1
4.15.0-20.21~16.04.1
4.15.0-22.24~16.04.1
4.15.0-23.25~16.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "block-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "block-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "crypto-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "crypto-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "dasd-extra-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "dasd-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "fat-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "fat-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "fb-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "firewire-core-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "floppy-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "fs-core-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "fs-core-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "fs-secondary-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "fs-secondary-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "input-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "input-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "ipmi-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "ipmi-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "irda-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "irda-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "kernel-image-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "kernel-image-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-cloud-tools-4.15.0-23-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-cloud-tools-4.15.0-23-lowlatency"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-headers-4.15.0-23"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-headers-4.15.0-23-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-headers-4.15.0-23-generic-lpae"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-headers-4.15.0-23-lowlatency"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-hwe-edge-cloud-tools-4.15.0-23"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-hwe-edge-tools-4.15.0-23"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-hwe-edge-udebs-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-hwe-edge-udebs-generic-lpae"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-image-4.15.0-23-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-image-4.15.0-23-generic-lpae"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-image-4.15.0-23-lowlatency"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-23-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-23-lowlatency"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-modules-4.15.0-23-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-modules-4.15.0-23-generic-lpae"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-modules-4.15.0-23-lowlatency"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-modules-extra-4.15.0-23-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-source-4.15.0"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-tools-4.15.0-23-generic"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-tools-4.15.0-23-generic-lpae"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "linux-tools-4.15.0-23-lowlatency"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "md-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "md-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "message-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "mouse-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "mouse-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "multipath-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "multipath-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nfs-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nfs-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nic-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nic-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nic-pcmcia-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nic-shared-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nic-shared-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nic-usb-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "nic-usb-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "parport-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "parport-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "pata-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "pcmcia-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "pcmcia-storage-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "plip-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "plip-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "ppp-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "ppp-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "sata-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "sata-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "scsi-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "scsi-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "serial-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "storage-core-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "storage-core-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "usb-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "usb-modules-4.15.0-23-generic-lpae-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "virtio-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "vlan-modules-4.15.0-23-generic-di"
        },
        {
            "binary_version": "4.15.0-23.25~16.04.1",
            "binary_name": "vlan-modules-4.15.0-23-generic-lpae-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

Ubuntu:18.04:LTS

linux-aws-5.0

Package

Name
linux-aws-5.0
Purl
pkg:deb/ubuntu/linux-aws-5.0@5.0.0-1027.30?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-1021.24~18.04.1
5.0.0-1022.25~18.04.1
5.0.0-1023.26~18.04.1
5.0.0-1024.27~18.04.1
5.0.0-1025.28
5.0.0-1027.30

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-aws-5.0-tools-5.0.0-1027"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-aws-headers-5.0.0-1027"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-buildinfo-5.0.0-1027-aws"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-cloud-tools-5.0.0-1027-aws"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-headers-5.0.0-1027-aws"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-image-5.0.0-1027-aws"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-modules-5.0.0-1027-aws"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-modules-extra-5.0.0-1027-aws"
        },
        {
            "binary_version": "5.0.0-1027.30",
            "binary_name": "linux-tools-5.0.0-1027-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-aws-5.3

Package

Name
linux-aws-5.3
Purl
pkg:deb/ubuntu/linux-aws-5.3@5.3.0-1035.37?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1016.17~18.04.1
5.3.0-1017.18~18.04.1
5.3.0-1019.21~18.04.1
5.3.0-1023.25~18.04.1
5.3.0-1028.30~18.04.1
5.3.0-1030.32~18.04.1
5.3.0-1032.34~18.04.2
5.3.0-1033.35
5.3.0-1034.36
5.3.0-1035.37

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-aws-5.3-cloud-tools-5.3.0-1035"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-aws-5.3-headers-5.3.0-1035"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-aws-5.3-tools-5.3.0-1035"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-buildinfo-5.3.0-1035-aws"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-cloud-tools-5.3.0-1035-aws"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-headers-5.3.0-1035-aws"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-image-5.3.0-1035-aws"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-modules-5.3.0-1035-aws"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-modules-extra-5.3.0-1035-aws"
        },
        {
            "binary_version": "5.3.0-1035.37",
            "binary_name": "linux-tools-5.3.0-1035-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@5.0.0-1036.38?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1002.2
4.15.0-1003.3
4.15.0-1004.4
4.15.0-1008.8
4.15.0-1009.9
4.15.0-1012.12
4.15.0-1013.13
4.15.0-1014.14
4.15.0-1018.18
4.15.0-1019.19
4.15.0-1021.21
4.15.0-1022.23
4.15.0-1023.24
4.15.0-1025.26
4.15.0-1028.29
4.15.0-1030.31
4.15.0-1031.32
4.15.0-1032.33
4.15.0-1035.36
4.15.0-1036.38
4.15.0-1037.39
4.18.0-1011.11~18.04.1
4.18.0-1013.13~18.04.1
4.18.0-1014.14~18.04.1
4.18.0-1018.18~18.04.1
4.18.0-1019.19~18.04.1
4.18.0-1020.20~18.04.1
4.18.0-1023.24~18.04.1
4.18.0-1024.25~18.04.1
4.18.0-1025.27~18.04.1

5.*

5.0.0-1014.14~18.04.1
5.0.0-1016.17~18.04.1
5.0.0-1018.19~18.04.1
5.0.0-1020.21~18.04.1
5.0.0-1022.23~18.04.1
5.0.0-1023.24~18.04.1
5.0.0-1025.27~18.04.1
5.0.0-1027.29~18.04.1
5.0.0-1028.30~18.04.1
5.0.0-1029.31~18.04.1
5.0.0-1031.33
5.0.0-1032.34
5.0.0-1035.37
5.0.0-1036.38

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-azure-cloud-tools-5.0.0-1036"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-azure-headers-5.0.0-1036"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-azure-tools-5.0.0-1036"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-buildinfo-5.0.0-1036-azure"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-cloud-tools-5.0.0-1036-azure"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-headers-5.0.0-1036-azure"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-image-unsigned-5.0.0-1036-azure"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-modules-5.0.0-1036-azure"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-modules-extra-5.0.0-1036-azure"
        },
        {
            "binary_version": "5.0.0-1036.38",
            "binary_name": "linux-tools-5.0.0-1036-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-5.3

Package

Name
linux-azure-5.3
Purl
pkg:deb/ubuntu/linux-azure-5.3@5.3.0-1035.36?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1007.8~18.04.1
5.3.0-1008.9~18.04.1
5.3.0-1009.10~18.04.1
5.3.0-1010.11~18.04.1
5.3.0-1012.13~18.04.1
5.3.0-1013.14~18.04.1
5.3.0-1016.17~18.04.1
5.3.0-1018.19~18.04.1
5.3.0-1019.20~18.04.1
5.3.0-1020.21~18.04.1
5.3.0-1022.23~18.04.1
5.3.0-1028.29~18.04.1
5.3.0-1031.32~18.04.1
5.3.0-1032.33~18.04.1
5.3.0-1034.35~18.04.1
5.3.0-1035.36

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-azure-5.3-cloud-tools-5.3.0-1035"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-azure-5.3-headers-5.3.0-1035"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-azure-5.3-tools-5.3.0-1035"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-buildinfo-5.3.0-1035-azure"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-cloud-tools-5.3.0-1035-azure"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-headers-5.3.0-1035-azure"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-image-unsigned-5.3.0-1035-azure"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-modules-5.3.0-1035-azure"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-modules-extra-5.3.0-1035-azure"
        },
        {
            "binary_version": "5.3.0-1035.36",
            "binary_name": "linux-tools-5.3.0-1035-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-edge

Package

Name
linux-azure-edge
Purl
pkg:deb/ubuntu/linux-azure-edge@5.0.0-1012.12~18.04.2?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.18.0-1006.6~18.04.1
4.18.0-1007.7~18.04.1
4.18.0-1008.8~18.04.1

5.*

5.0.0-1012.12~18.04.2

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-azure-edge-cloud-tools-5.0.0-1012"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-azure-edge-tools-5.0.0-1012"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-azure-headers-5.0.0-1012"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-buildinfo-5.0.0-1012-azure"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-cloud-tools-5.0.0-1012-azure"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-headers-5.0.0-1012-azure"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-image-unsigned-5.0.0-1012-azure"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-modules-5.0.0-1012-azure"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-modules-extra-5.0.0-1012-azure"
        },
        {
            "binary_version": "5.0.0-1012.12~18.04.2",
            "binary_name": "linux-tools-5.0.0-1012-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp@5.0.0-1034.35?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1001.1
4.15.0-1003.3
4.15.0-1005.5
4.15.0-1006.6
4.15.0-1008.8
4.15.0-1009.9
4.15.0-1010.10
4.15.0-1014.14
4.15.0-1015.15
4.15.0-1017.18
4.15.0-1018.19
4.15.0-1019.20
4.15.0-1021.22
4.15.0-1023.24
4.15.0-1024.25
4.15.0-1025.26
4.15.0-1026.27
4.15.0-1027.28
4.15.0-1028.29
4.15.0-1029.31
4.15.0-1030.32
4.15.0-1032.34
4.15.0-1033.35
4.15.0-1034.36
4.15.0-1036.38
4.15.0-1037.39
4.15.0-1040.42
4.15.0-1042.45
4.15.0-1044.70

5.*

5.0.0-1020.20~18.04.1
5.0.0-1021.21~18.04.1
5.0.0-1025.26~18.04.1
5.0.0-1026.27~18.04.1
5.0.0-1028.29~18.04.1
5.0.0-1029.30~18.04.1
5.0.0-1031.32
5.0.0-1033.34
5.0.0-1034.35

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-buildinfo-5.0.0-1034-gcp"
        },
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-gcp-headers-5.0.0-1034"
        },
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-gcp-tools-5.0.0-1034"
        },
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-headers-5.0.0-1034-gcp"
        },
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-image-unsigned-5.0.0-1034-gcp"
        },
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-modules-5.0.0-1034-gcp"
        },
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-modules-extra-5.0.0-1034-gcp"
        },
        {
            "binary_version": "5.0.0-1034.35",
            "binary_name": "linux-tools-5.0.0-1034-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp-5.3

Package

Name
linux-gcp-5.3
Purl
pkg:deb/ubuntu/linux-gcp-5.3@5.3.0-1032.34~18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1008.9~18.04.1
5.3.0-1009.10~18.04.1
5.3.0-1010.11~18.04.1
5.3.0-1012.13~18.04.1
5.3.0-1014.15~18.04.1
5.3.0-1016.17~18.04.1
5.3.0-1017.18~18.04.1
5.3.0-1018.19~18.04.1
5.3.0-1020.22~18.04.1
5.3.0-1026.28~18.04.1
5.3.0-1029.31~18.04.1
5.3.0-1030.32~18.04.1
5.3.0-1032.34~18.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-buildinfo-5.3.0-1032-gcp"
        },
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-gcp-5.3-headers-5.3.0-1032"
        },
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-gcp-5.3-tools-5.3.0-1032"
        },
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-headers-5.3.0-1032-gcp"
        },
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-image-unsigned-5.3.0-1032-gcp"
        },
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-modules-5.3.0-1032-gcp"
        },
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-modules-extra-5.3.0-1032-gcp"
        },
        {
            "binary_version": "5.3.0-1032.34~18.04.1",
            "binary_name": "linux-tools-5.3.0-1032-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gke-4.15

Package

Name
linux-gke-4.15
Purl
pkg:deb/ubuntu/linux-gke-4.15@4.15.0-1079.84?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1030.32
4.15.0-1032.34
4.15.0-1033.35
4.15.0-1034.36
4.15.0-1036.38
4.15.0-1037.39
4.15.0-1040.42
4.15.0-1041.43
4.15.0-1042.44
4.15.0-1044.46
4.15.0-1045.48
4.15.0-1046.49
4.15.0-1048.51
4.15.0-1049.52
4.15.0-1050.53
4.15.0-1052.55
4.15.0-1055.58
4.15.0-1057.60
4.15.0-1058.61
4.15.0-1059.62
4.15.0-1063.66
4.15.0-1064.67
4.15.0-1066.69
4.15.0-1067.70
4.15.0-1069.72
4.15.0-1070.73
4.15.0-1072.76
4.15.0-1073.78
4.15.0-1074.79
4.15.0-1076.81
4.15.0-1077.82
4.15.0-1078.83
4.15.0-1079.84

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-buildinfo-4.15.0-1079-gke"
        },
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-gke-4.15-headers-4.15.0-1079"
        },
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-gke-4.15-tools-4.15.0-1079"
        },
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-headers-4.15.0-1079-gke"
        },
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-image-unsigned-4.15.0-1079-gke"
        },
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-modules-4.15.0-1079-gke"
        },
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-modules-extra-4.15.0-1079-gke"
        },
        {
            "binary_version": "4.15.0-1079.84",
            "binary_name": "linux-tools-4.15.0-1079-gke"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gke-5.4

Package

Name
linux-gke-5.4
Purl
pkg:deb/ubuntu/linux-gke-5.4@5.4.0-1080.86~18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1025.25~18.04.1
5.4.0-1027.28~18.04.1
5.4.0-1029.31~18.04.1
5.4.0-1030.32~18.04.1
5.4.0-1032.34~18.04.1
5.4.0-1033.35~18.04.1
5.4.0-1035.37~18.04.1
5.4.0-1036.38~18.04.1
5.4.0-1037.39~18.04.1
5.4.0-1039.41~18.04.1
5.4.0-1040.42~18.04.1
5.4.0-1042.44~18.04.1
5.4.0-1043.45~18.04.1
5.4.0-1044.46~18.04.1
5.4.0-1046.48~18.04.1
5.4.0-1049.52~18.04.1
5.4.0-1051.54~18.04.1
5.4.0-1052.55~18.04.1
5.4.0-1053.56~18.04.1
5.4.0-1054.57~18.04.1
5.4.0-1055.58~18.04.1
5.4.0-1056.59~18.04.1
5.4.0-1057.60~18.04.1
5.4.0-1059.62~18.04.1
5.4.0-1061.64~18.04.1
5.4.0-1062.65~18.04.1
5.4.0-1063.66~18.04.1
5.4.0-1065.68~18.04.1
5.4.0-1066.69~18.04.1
5.4.0-1067.70~18.04.1
5.4.0-1068.71~18.04.1
5.4.0-1071.76~18.04.3
5.4.0-1072.77~18.04.1
5.4.0-1074.79~18.04.1
5.4.0-1076.82~18.04.1
5.4.0-1078.84~18.04.1
5.4.0-1080.86~18.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-1080-gke"
        },
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-gke-5.4-headers-5.4.0-1080"
        },
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-gke-5.4-tools-5.4.0-1080"
        },
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-headers-5.4.0-1080-gke"
        },
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-1080-gke"
        },
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-modules-5.4.0-1080-gke"
        },
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-modules-extra-5.4.0-1080-gke"
        },
        {
            "binary_version": "5.4.0-1080.86~18.04.1",
            "binary_name": "linux-tools-5.4.0-1080-gke"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gkeop-5.4

Package

Name
linux-gkeop-5.4
Purl
pkg:deb/ubuntu/linux-gkeop-5.4@5.4.0-1051.54~18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1001.1
5.4.0-1003.3
5.4.0-1004.5
5.4.0-1005.6
5.4.0-1007.8~18.04.1
5.4.0-1008.9~18.04.1
5.4.0-1009.10~18.04.1
5.4.0-1010.11~18.04.1
5.4.0-1011.12~18.04.2
5.4.0-1012.13~18.04.1
5.4.0-1013.14~18.04.1
5.4.0-1014.15~18.04.1
5.4.0-1015.16~18.04.1
5.4.0-1016.17~18.04.1
5.4.0-1018.19~18.04.1
5.4.0-1021.22~18.04.1
5.4.0-1022.23~18.04.1
5.4.0-1023.24~18.04.1
5.4.0-1024.25~18.04.1
5.4.0-1025.26~18.04.1
5.4.0-1026.27~18.04.1
5.4.0-1027.28~18.04.1
5.4.0-1029.30~18.04.2
5.4.0-1031.32~18.04.1
5.4.0-1032.33~18.04.1
5.4.0-1033.34~18.04.1
5.4.0-1034.35~18.04.1
5.4.0-1036.37~18.04.1
5.4.0-1037.38~18.04.1
5.4.0-1038.39~18.04.1
5.4.0-1039.40~18.04.1
5.4.0-1040.41~18.04.1
5.4.0-1043.44~18.04.1
5.4.0-1046.48~18.04.1
5.4.0-1048.51~18.04.1
5.4.0-1049.52~18.04.1
5.4.0-1051.54~18.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-1051-gkeop"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-cloud-tools-5.4.0-1051-gkeop"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1051"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-gkeop-5.4-headers-5.4.0-1051"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-gkeop-5.4-source-5.4.0"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-gkeop-5.4-tools-5.4.0-1051"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-headers-5.4.0-1051-gkeop"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-1051-gkeop"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-modules-5.4.0-1051-gkeop"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-modules-extra-5.4.0-1051-gkeop"
        },
        {
            "binary_version": "5.4.0-1051.54~18.04.1",
            "binary_name": "linux-tools-5.4.0-1051-gkeop"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-hwe

Package

Name
linux-hwe
Purl
pkg:deb/ubuntu/linux-hwe@5.3.0-76.72?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.18.0-13.14~18.04.1
4.18.0-14.15~18.04.1
4.18.0-15.16~18.04.1
4.18.0-16.17~18.04.1
4.18.0-17.18~18.04.1
4.18.0-18.19~18.04.1
4.18.0-20.21~18.04.1
4.18.0-21.22~18.04.1
4.18.0-22.23~18.04.1
4.18.0-24.25~18.04.1
4.18.0-25.26~18.04.1

5.*

5.0.0-23.24~18.04.1
5.0.0-25.26~18.04.1
5.0.0-27.28~18.04.1
5.0.0-29.31~18.04.1
5.0.0-31.33~18.04.1
5.0.0-32.34~18.04.2
5.0.0-35.38~18.04.1
5.0.0-36.39~18.04.1
5.0.0-37.40~18.04.1
5.3.0-26.28~18.04.1
5.3.0-28.30~18.04.1
5.3.0-40.32~18.04.1
5.3.0-42.34~18.04.1
5.3.0-45.37~18.04.1
5.3.0-46.38~18.04.1
5.3.0-51.44~18.04.2
5.3.0-53.47~18.04.1
5.3.0-59.53~18.04.1
5.3.0-61.55~18.04.1
5.3.0-62.56~18.04.1
5.3.0-64.58~18.04.1
5.3.0-65.59
5.3.0-66.60
5.3.0-67.61
5.3.0-68.63
5.3.0-69.65
5.3.0-70.66
5.3.0-72.68
5.3.0-73.69
5.3.0-74.70
5.3.0-75.71
5.3.0-76.72

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "block-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "crypto-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "fat-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "fb-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "firewire-core-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "floppy-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "fs-core-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "fs-secondary-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "input-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "ipmi-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "kernel-image-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-buildinfo-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-buildinfo-5.3.0-76-lowlatency"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-cloud-tools-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-cloud-tools-5.3.0-76-lowlatency"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-headers-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-headers-5.3.0-76-lowlatency"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-hwe-cloud-tools-5.3.0-76"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-hwe-headers-5.3.0-76"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-hwe-tools-5.3.0-76"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-hwe-udebs-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-image-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-image-5.3.0-76-lowlatency"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-image-unsigned-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-image-unsigned-5.3.0-76-lowlatency"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-modules-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-modules-5.3.0-76-lowlatency"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-modules-extra-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-source-5.3.0"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-tools-5.3.0-76-generic"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "linux-tools-5.3.0-76-lowlatency"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "md-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "message-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "mouse-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "multipath-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "nfs-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "nic-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "nic-pcmcia-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "nic-shared-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "nic-usb-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "parport-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "pata-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "pcmcia-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "pcmcia-storage-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "plip-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "ppp-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "sata-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "scsi-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "serial-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "storage-core-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "usb-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "virtio-modules-5.3.0-76-generic-di"
        },
        {
            "binary_version": "5.3.0-76.72",
            "binary_name": "vlan-modules-5.3.0-76-generic-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem

Package

Name
linux-oem
Purl
pkg:deb/ubuntu/linux-oem@4.15.0-1103.114?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1002.3
4.15.0-1004.5
4.15.0-1006.9
4.15.0-1008.11
4.15.0-1009.12
4.15.0-1012.15
4.15.0-1013.16
4.15.0-1015.18
4.15.0-1017.20
4.15.0-1018.21
4.15.0-1021.24
4.15.0-1024.29
4.15.0-1026.31
4.15.0-1028.33
4.15.0-1030.35
4.15.0-1033.38
4.15.0-1034.39
4.15.0-1035.40
4.15.0-1036.41
4.15.0-1038.43
4.15.0-1039.44
4.15.0-1043.48
4.15.0-1045.50
4.15.0-1050.57
4.15.0-1056.65
4.15.0-1057.66
4.15.0-1059.68
4.15.0-1063.72
4.15.0-1064.73
4.15.0-1065.75
4.15.0-1066.76
4.15.0-1067.77
4.15.0-1069.79
4.15.0-1073.83
4.15.0-1076.86
4.15.0-1079.89
4.15.0-1080.90
4.15.0-1081.91
4.15.0-1087.97
4.15.0-1090.100
4.15.0-1091.101
4.15.0-1093.103
4.15.0-1094.104
4.15.0-1096.106
4.15.0-1097.107
4.15.0-1099.109
4.15.0-1100.110
4.15.0-1101.112
4.15.0-1102.113
4.15.0-1103.114

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "block-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "crypto-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "fat-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "fb-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "firewire-core-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "floppy-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "fs-core-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "fs-secondary-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "input-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "ipmi-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "irda-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "kernel-image-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-buildinfo-4.15.0-1103-oem"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-headers-4.15.0-1103-oem"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-image-unsigned-4.15.0-1103-oem"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-modules-4.15.0-1103-oem"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-oem-headers-4.15.0-1103"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-oem-tools-4.15.0-1103"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-tools-4.15.0-1103-oem"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "linux-udebs-oem"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "md-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "message-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "mouse-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "multipath-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "nfs-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "nic-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "nic-pcmcia-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "nic-shared-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "nic-usb-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "parport-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "pata-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "pcmcia-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "pcmcia-storage-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "plip-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "ppp-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "sata-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "scsi-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "serial-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "storage-core-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "usb-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "virtio-modules-4.15.0-1103-oem-di"
        },
        {
            "binary_version": "4.15.0-1103.114",
            "binary_name": "vlan-modules-4.15.0-1103-oem-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oracle-5.0

Package

Name
linux-oracle-5.0
Purl
pkg:deb/ubuntu/linux-oracle-5.0@5.0.0-1014.19?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-1007.12~18.04.1
5.0.0-1008.13~18.04.1
5.0.0-1009.14~18.04.1
5.0.0-1010.15~18.04.1
5.0.0-1011.16
5.0.0-1013.18
5.0.0-1014.19

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-buildinfo-5.0.0-1014-oracle"
        },
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-headers-5.0.0-1014-oracle"
        },
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-image-unsigned-5.0.0-1014-oracle"
        },
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-modules-5.0.0-1014-oracle"
        },
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-modules-extra-5.0.0-1014-oracle"
        },
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-oracle-5.0-headers-5.0.0-1014"
        },
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-oracle-5.0-tools-5.0.0-1014"
        },
        {
            "binary_version": "5.0.0-1014.19",
            "binary_name": "linux-tools-5.0.0-1014-oracle"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oracle-5.3

Package

Name
linux-oracle-5.3
Purl
pkg:deb/ubuntu/linux-oracle-5.3@5.3.0-1030.32~18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1011.12~18.04.1
5.3.0-1013.14~18.04.1
5.3.0-1014.15~18.04.1
5.3.0-1016.18~18.04.1
5.3.0-1018.20~18.04.1
5.3.0-1024.26~18.04.1
5.3.0-1027.29~18.04.1
5.3.0-1028.30~18.04.1
5.3.0-1030.32~18.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-buildinfo-5.3.0-1030-oracle"
        },
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-headers-5.3.0-1030-oracle"
        },
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-image-unsigned-5.3.0-1030-oracle"
        },
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-modules-5.3.0-1030-oracle"
        },
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-modules-extra-5.3.0-1030-oracle"
        },
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-oracle-5.3-headers-5.3.0-1030"
        },
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-oracle-5.3-tools-5.3.0-1030"
        },
        {
            "binary_version": "5.3.0-1030.32~18.04.1",
            "binary_name": "linux-tools-5.3.0-1030-oracle"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

Ubuntu:20.04:LTS

linux-aws-5.11

Package

Name
linux-aws-5.11
Purl
pkg:deb/ubuntu/linux-aws-5.11@5.11.0-1028.31~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1009.9~20.04.2
5.11.0-1014.15~20.04.1
5.11.0-1016.17~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.2
5.11.0-1021.22~20.04.2
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-aws-5.11-cloud-tools-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-aws-5.11-headers-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-aws-5.11-tools-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-buildinfo-5.11.0-1028-aws"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-cloud-tools-5.11.0-1028-aws"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-headers-5.11.0-1028-aws"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-image-unsigned-5.11.0-1028-aws"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-modules-5.11.0-1028-aws"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-modules-extra-5.11.0-1028-aws"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-tools-5.11.0-1028-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-aws-5.13

Package

Name
linux-aws-5.13
Purl
pkg:deb/ubuntu/linux-aws-5.13@5.13.0-1031.35~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1008.9~20.04.2
5.13.0-1011.12~20.04.1
5.13.0-1012.13~20.04.1
5.13.0-1014.15~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1019.21~20.04.1
5.13.0-1021.23~20.04.2
5.13.0-1022.24~20.04.1
5.13.0-1023.25~20.04.1
5.13.0-1025.27~20.04.1
5.13.0-1028.31~20.04.1
5.13.0-1029.32~20.04.1
5.13.0-1031.35~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1031"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-aws-5.13-headers-5.13.0-1031"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-aws-5.13-tools-5.13.0-1031"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-1031-aws"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-cloud-tools-5.13.0-1031-aws"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-headers-5.13.0-1031-aws"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-image-unsigned-5.13.0-1031-aws"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-modules-5.13.0-1031-aws"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-modules-extra-5.13.0-1031-aws"
        },
        {
            "binary_version": "5.13.0-1031.35~20.04.1",
            "binary_name": "linux-tools-5.13.0-1031-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-aws-5.8

Package

Name
linux-aws-5.8
Purl
pkg:deb/ubuntu/linux-aws-5.8@5.8.0-1042.44~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1035.37~20.04.1
5.8.0-1038.40~20.04.1
5.8.0-1041.43~20.04.1
5.8.0-1042.44~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-aws-5.8-cloud-tools-5.8.0-1042"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-aws-5.8-headers-5.8.0-1042"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-aws-5.8-tools-5.8.0-1042"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-1042-aws"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-cloud-tools-5.8.0-1042-aws"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-headers-5.8.0-1042-aws"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-image-5.8.0-1042-aws"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-modules-5.8.0-1042-aws"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-modules-extra-5.8.0-1042-aws"
        },
        {
            "binary_version": "5.8.0-1042.44~20.04.1",
            "binary_name": "linux-tools-5.8.0-1042-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-5.11

Package

Name
linux-azure-5.11
Purl
pkg:deb/ubuntu/linux-azure-5.11@5.11.0-1028.31~20.04.2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1007.7~20.04.2
5.11.0-1012.13~20.04.1
5.11.0-1013.14~20.04.1
5.11.0-1015.16~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.2

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-azure-5.11-cloud-tools-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-azure-5.11-headers-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-azure-5.11-tools-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-buildinfo-5.11.0-1028-azure"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-cloud-tools-5.11.0-1028-azure"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-headers-5.11.0-1028-azure"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-image-unsigned-5.11.0-1028-azure"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-modules-5.11.0-1028-azure"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-modules-extra-5.11.0-1028-azure"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.2",
            "binary_name": "linux-tools-5.11.0-1028-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-5.13

Package

Name
linux-azure-5.13
Purl
pkg:deb/ubuntu/linux-azure-5.13@5.13.0-1031.37~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1009.10~20.04.2
5.13.0-1012.14~20.04.1
5.13.0-1013.15~20.04.1
5.13.0-1014.16~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1021.24~20.04.1
5.13.0-1022.26~20.04.1
5.13.0-1023.27~20.04.1
5.13.0-1025.29~20.04.1
5.13.0-1028.33~20.04.1
5.13.0-1029.34~20.04.1
5.13.0-1031.37~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-azure-5.13-cloud-tools-5.13.0-1031"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-azure-5.13-headers-5.13.0-1031"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-azure-5.13-tools-5.13.0-1031"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-1031-azure"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-cloud-tools-5.13.0-1031-azure"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-headers-5.13.0-1031-azure"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-image-unsigned-5.13.0-1031-azure"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-modules-5.13.0-1031-azure"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-modules-extra-5.13.0-1031-azure"
        },
        {
            "binary_version": "5.13.0-1031.37~20.04.1",
            "binary_name": "linux-tools-5.13.0-1031-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-5.8

Package

Name
linux-azure-5.8
Purl
pkg:deb/ubuntu/linux-azure-5.8@5.8.0-1043.46~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1033.35~20.04.1
5.8.0-1036.38~20.04.1
5.8.0-1039.42~20.04.1
5.8.0-1040.43~20.04.1
5.8.0-1041.44~20.04.1
5.8.0-1042.45~20.04.1
5.8.0-1043.46~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-azure-5.8-cloud-tools-5.8.0-1043"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-azure-5.8-headers-5.8.0-1043"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-azure-5.8-tools-5.8.0-1043"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-1043-azure"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-cloud-tools-5.8.0-1043-azure"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-headers-5.8.0-1043-azure"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-image-unsigned-5.8.0-1043-azure"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-modules-5.8.0-1043-azure"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-modules-extra-5.8.0-1043-azure"
        },
        {
            "binary_version": "5.8.0-1043.46~20.04.1",
            "binary_name": "linux-tools-5.8.0-1043-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-fde

Package

Name
linux-azure-fde
Purl
pkg:deb/ubuntu/linux-azure-fde@5.4.0-1103.109+cvm1.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1063.66+cvm2.2
5.4.0-1063.66+cvm3.2
5.4.0-1064.67+cvm1.1
5.4.0-1065.68+cvm2.1
5.4.0-1067.70+cvm1.1
5.4.0-1068.71+cvm1.1
5.4.0-1069.72+cvm1.1
5.4.0-1070.73+cvm1.1
5.4.0-1072.75+cvm1.1
5.4.0-1073.76+cvm1.1
5.4.0-1074.77+cvm1.1
5.4.0-1076.79+cvm1.1
5.4.0-1078.81+cvm1.1
5.4.0-1080.83+cvm1.1
5.4.0-1083.87+cvm1.1
5.4.0-1085.90+cvm1.1
5.4.0-1085.90+cvm2.1
5.4.0-1086.91+cvm1.1
5.4.0-1089.94+cvm1.2
5.4.0-1090.95+cvm1.1
5.4.0-1091.96+cvm1.1
5.4.0-1092.97+cvm1.1
5.4.0-1095.101+cvm1.1
5.4.0-1098.104+cvm1.1
5.4.0-1100.106+cvm1.1
5.4.0-1103.109+cvm1.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.4.0-1103.109+cvm1.1",
            "binary_name": "linux-image-unsigned-5.4.0-1103-azure-fde"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp-5.11

Package

Name
linux-gcp-5.11
Purl
pkg:deb/ubuntu/linux-gcp-5.11@5.11.0-1029.33~20.04.3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1009.10~20.04.1
5.11.0-1014.16~20.04.1
5.11.0-1017.19~20.04.1
5.11.0-1018.20~20.04.2
5.11.0-1020.22~20.04.1
5.11.0-1021.23~20.04.1
5.11.0-1022.24~20.04.1
5.11.0-1023.25~20.04.1
5.11.0-1024.26~20.04.1
5.11.0-1026.29~20.04.1
5.11.0-1028.32~20.04.1
5.11.0-1029.33~20.04.3

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-buildinfo-5.11.0-1029-gcp"
        },
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-gcp-5.11-headers-5.11.0-1029"
        },
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-gcp-5.11-tools-5.11.0-1029"
        },
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-headers-5.11.0-1029-gcp"
        },
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-image-unsigned-5.11.0-1029-gcp"
        },
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-modules-5.11.0-1029-gcp"
        },
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-modules-extra-5.11.0-1029-gcp"
        },
        {
            "binary_version": "5.11.0-1029.33~20.04.3",
            "binary_name": "linux-tools-5.11.0-1029-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp-5.13

Package

Name
linux-gcp-5.13
Purl
pkg:deb/ubuntu/linux-gcp-5.13@5.13.0-1033.40~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1008.9~20.04.3
5.13.0-1012.15~20.04.1
5.13.0-1013.16~20.04.1
5.13.0-1015.18~20.04.1
5.13.0-1019.23~20.04.1
5.13.0-1021.25~20.04.1
5.13.0-1023.28~20.04.1
5.13.0-1024.29~20.04.1
5.13.0-1025.30~20.04.1
5.13.0-1027.32~20.04.1
5.13.0-1030.36~20.04.1
5.13.0-1031.37~20.04.1
5.13.0-1033.40~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-1033-gcp"
        },
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-gcp-5.13-headers-5.13.0-1033"
        },
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-gcp-5.13-tools-5.13.0-1033"
        },
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-headers-5.13.0-1033-gcp"
        },
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-image-unsigned-5.13.0-1033-gcp"
        },
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-modules-5.13.0-1033-gcp"
        },
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-modules-extra-5.13.0-1033-gcp"
        },
        {
            "binary_version": "5.13.0-1033.40~20.04.1",
            "binary_name": "linux-tools-5.13.0-1033-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp-5.8

Package

Name
linux-gcp-5.8
Purl
pkg:deb/ubuntu/linux-gcp-5.8@5.8.0-1039.41?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1032.34~20.04.1
5.8.0-1035.37~20.04.1
5.8.0-1038.40~20.04.1
5.8.0-1039.41

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-buildinfo-5.8.0-1039-gcp"
        },
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-gcp-5.8-headers-5.8.0-1039"
        },
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-gcp-5.8-tools-5.8.0-1039"
        },
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-headers-5.8.0-1039-gcp"
        },
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-image-unsigned-5.8.0-1039-gcp"
        },
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-modules-5.8.0-1039-gcp"
        },
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-modules-extra-5.8.0-1039-gcp"
        },
        {
            "binary_version": "5.8.0-1039.41",
            "binary_name": "linux-tools-5.8.0-1039-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke@5.4.0-1105.112?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1033.35
5.4.0-1035.37
5.4.0-1036.38
5.4.0-1037.39
5.4.0-1039.41
5.4.0-1041.43
5.4.0-1042.44
5.4.0-1043.45
5.4.0-1044.46
5.4.0-1046.48
5.4.0-1049.52
5.4.0-1051.54
5.4.0-1052.55
5.4.0-1053.56
5.4.0-1054.57
5.4.0-1055.58
5.4.0-1056.59
5.4.0-1057.60
5.4.0-1059.62
5.4.0-1061.64
5.4.0-1062.65
5.4.0-1063.66
5.4.0-1065.68
5.4.0-1066.69
5.4.0-1067.70
5.4.0-1068.71
5.4.0-1071.76
5.4.0-1072.77
5.4.0-1074.79
5.4.0-1076.82
5.4.0-1078.84
5.4.0-1080.86
5.4.0-1081.87
5.4.0-1083.89
5.4.0-1084.90
5.4.0-1086.93
5.4.0-1087.94
5.4.0-1090.97
5.4.0-1091.98
5.4.0-1094.101
5.4.0-1095.102
5.4.0-1096.103
5.4.0-1097.104
5.4.0-1098.105
5.4.0-1099.106
5.4.0-1100.107
5.4.0-1101.108
5.4.0-1102.109
5.4.0-1103.110
5.4.0-1104.111
5.4.0-1105.112

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-buildinfo-5.4.0-1105-gke"
        },
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-gke-headers-5.4.0-1105"
        },
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-gke-tools-5.4.0-1105"
        },
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-headers-5.4.0-1105-gke"
        },
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-image-unsigned-5.4.0-1105-gke"
        },
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-modules-5.4.0-1105-gke"
        },
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-modules-extra-5.4.0-1105-gke"
        },
        {
            "binary_version": "5.4.0-1105.112",
            "binary_name": "linux-tools-5.4.0-1105-gke"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gke-5.15

Package

Name
linux-gke-5.15
Purl
pkg:deb/ubuntu/linux-gke-5.15@5.15.0-1039.44~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.15.0-1011.14~20.04.1
5.15.0-1014.17~20.04.1
5.15.0-1015.18~20.04.1
5.15.0-1016.19~20.04.1
5.15.0-1019.23~20.04.1
5.15.0-1020.25~20.04.1
5.15.0-1023.28~20.04.2
5.15.0-1027.32~20.04.1
5.15.0-1028.33~20.04.1
5.15.0-1029.34~20.04.1
5.15.0-1031.36~20.04.1
5.15.0-1032.37~20.04.1
5.15.0-1033.38~20.04.1
5.15.0-1034.39~20.04.1
5.15.0-1036.41~20.04.1
5.15.0-1037.42~20.04.1
5.15.0-1038.43~20.04.1
5.15.0-1039.44~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1039-gke"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-gke-5.15-headers-5.15.0-1039"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-gke-5.15-tools-5.15.0-1039"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-headers-5.15.0-1039-gke"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1039-gke"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-modules-5.15.0-1039-gke"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1039-gke"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke"
        },
        {
            "binary_version": "5.15.0-1039.44~20.04.1",
            "binary_name": "linux-tools-5.15.0-1039-gke"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-hwe-5.11

Package

Name
linux-hwe-5.11
Purl
pkg:deb/ubuntu/linux-hwe-5.11@5.11.0-46.51~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-22.23~20.04.1
5.11.0-25.27~20.04.1
5.11.0-27.29~20.04.1
5.11.0-34.36~20.04.1
5.11.0-36.40~20.04.1
5.11.0-37.41~20.04.2
5.11.0-38.42~20.04.1
5.11.0-40.44~20.04.2
5.11.0-41.45~20.04.1
5.11.0-43.47~20.04.2
5.11.0-44.48~20.04.2
5.11.0-46.51~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "block-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "block-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "block-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "crypto-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "crypto-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "crypto-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "dasd-extra-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "dasd-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fat-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fat-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fat-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fb-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "firewire-core-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "floppy-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fs-core-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fs-core-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fs-core-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fs-secondary-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fs-secondary-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "fs-secondary-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "input-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "input-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "input-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "ipmi-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "ipmi-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "ipmi-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "kernel-image-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "kernel-image-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "kernel-image-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-buildinfo-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-buildinfo-5.11.0-46-generic-64k"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-buildinfo-5.11.0-46-generic-lpae"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-buildinfo-5.11.0-46-lowlatency"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-cloud-tools-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-cloud-tools-5.11.0-46-lowlatency"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-headers-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-headers-5.11.0-46-generic-64k"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-headers-5.11.0-46-generic-lpae"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-headers-5.11.0-46-lowlatency"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-cloud-tools-5.11.0-46"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-cloud-tools-common"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-headers-5.11.0-46"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-source-5.11.0"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-tools-5.11.0-46"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-tools-common"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-tools-host"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-udebs-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-udebs-generic-64k"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-hwe-5.11-udebs-generic-lpae"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-image-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-image-5.11.0-46-generic-lpae"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-image-unsigned-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-image-unsigned-5.11.0-46-generic-64k"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-image-unsigned-5.11.0-46-lowlatency"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-modules-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-modules-5.11.0-46-generic-64k"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-modules-5.11.0-46-generic-lpae"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-modules-5.11.0-46-lowlatency"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-modules-extra-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-tools-5.11.0-46-generic"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-tools-5.11.0-46-generic-64k"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-tools-5.11.0-46-generic-lpae"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "linux-tools-5.11.0-46-lowlatency"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "md-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "md-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "md-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "message-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "message-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "mouse-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "mouse-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "mouse-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "multipath-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "multipath-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "multipath-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nfs-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nfs-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nfs-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-pcmcia-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-shared-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-shared-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-shared-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-usb-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-usb-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "nic-usb-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "parport-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "parport-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "parport-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "pata-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "pcmcia-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "pcmcia-storage-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "plip-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "plip-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "plip-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "ppp-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "ppp-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "ppp-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "sata-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "sata-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "sata-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "scsi-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "scsi-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "scsi-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "serial-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "storage-core-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "storage-core-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "storage-core-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "usb-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "usb-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "usb-modules-5.11.0-46-generic-lpae-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "virtio-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "virtio-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "vlan-modules-5.11.0-46-generic-64k-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "vlan-modules-5.11.0-46-generic-di"
        },
        {
            "binary_version": "5.11.0-46.51~20.04.1",
            "binary_name": "vlan-modules-5.11.0-46-generic-lpae-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-hwe-5.13

Package

Name
linux-hwe-5.13
Purl
pkg:deb/ubuntu/linux-hwe-5.13@5.13.0-52.59~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-21.21~20.04.1
5.13.0-22.22~20.04.1
5.13.0-23.23~20.04.2
5.13.0-25.26~20.04.1
5.13.0-27.29~20.04.1
5.13.0-28.31~20.04.1
5.13.0-30.33~20.04.1
5.13.0-35.40~20.04.1
5.13.0-37.42~20.04.1
5.13.0-39.44~20.04.1
5.13.0-40.45~20.04.1
5.13.0-41.46~20.04.1
5.13.0-44.49~20.04.1
5.13.0-48.54~20.04.1
5.13.0-51.58~20.04.1
5.13.0-52.59~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "block-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "block-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "block-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "crypto-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "crypto-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "crypto-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "dasd-extra-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "dasd-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fat-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fat-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fat-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fb-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "firewire-core-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "floppy-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fs-core-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fs-core-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fs-core-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fs-secondary-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fs-secondary-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "fs-secondary-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "input-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "input-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "input-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "ipmi-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "ipmi-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "ipmi-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "kernel-image-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "kernel-image-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "kernel-image-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-52-generic-64k"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-52-generic-lpae"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-52-lowlatency"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-cloud-tools-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-cloud-tools-5.13.0-52-lowlatency"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-headers-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-headers-5.13.0-52-generic-64k"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-headers-5.13.0-52-generic-lpae"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-headers-5.13.0-52-lowlatency"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-cloud-tools-5.13.0-52"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-cloud-tools-common"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-headers-5.13.0-52"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-source-5.13.0"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-tools-5.13.0-52"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-tools-common"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-tools-host"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-udebs-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-udebs-generic-64k"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-hwe-5.13-udebs-generic-lpae"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-image-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-image-5.13.0-52-generic-lpae"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-image-unsigned-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-image-unsigned-5.13.0-52-generic-64k"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-image-unsigned-5.13.0-52-lowlatency"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-modules-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-modules-5.13.0-52-generic-64k"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-modules-5.13.0-52-generic-lpae"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-modules-5.13.0-52-lowlatency"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-modules-extra-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-tools-5.13.0-52-generic"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-tools-5.13.0-52-generic-64k"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-tools-5.13.0-52-generic-lpae"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "linux-tools-5.13.0-52-lowlatency"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "md-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "md-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "md-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "message-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "message-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "mouse-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "mouse-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "mouse-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "multipath-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "multipath-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "multipath-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nfs-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nfs-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nfs-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-pcmcia-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-shared-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-shared-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-shared-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-usb-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-usb-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "nic-usb-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "parport-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "parport-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "parport-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "pata-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "pcmcia-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "pcmcia-storage-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "plip-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "plip-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "plip-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "ppp-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "ppp-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "ppp-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "sata-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "sata-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "sata-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "scsi-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "scsi-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "scsi-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "serial-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "storage-core-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "storage-core-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "storage-core-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "usb-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "usb-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "usb-modules-5.13.0-52-generic-lpae-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "virtio-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "virtio-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "vlan-modules-5.13.0-52-generic-64k-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "vlan-modules-5.13.0-52-generic-di"
        },
        {
            "binary_version": "5.13.0-52.59~20.04.1",
            "binary_name": "vlan-modules-5.13.0-52-generic-lpae-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-hwe-5.8

Package

Name
linux-hwe-5.8
Purl
pkg:deb/ubuntu/linux-hwe-5.8@5.8.0-63.71~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-23.24~20.04.1
5.8.0-25.26~20.04.1
5.8.0-28.30~20.04.1
5.8.0-29.31~20.04.1
5.8.0-31.33~20.04.1
5.8.0-33.36~20.04.1
5.8.0-34.37~20.04.2
5.8.0-36.40~20.04.1
5.8.0-38.43~20.04.1
5.8.0-40.45~20.04.1
5.8.0-41.46~20.04.1
5.8.0-43.49~20.04.1
5.8.0-44.50~20.04.1
5.8.0-45.51~20.04.1
5.8.0-48.54~20.04.1
5.8.0-49.55~20.04.1
5.8.0-50.56~20.04.1
5.8.0-53.60~20.04.1
5.8.0-55.62~20.04.1
5.8.0-59.66~20.04.1
5.8.0-63.71~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "block-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "block-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "block-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "crypto-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "crypto-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "crypto-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "dasd-extra-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "dasd-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fat-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fat-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fat-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fb-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "firewire-core-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "floppy-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fs-core-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fs-core-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fs-core-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fs-secondary-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fs-secondary-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "fs-secondary-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "input-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "input-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "input-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "ipmi-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "ipmi-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "ipmi-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "kernel-image-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "kernel-image-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "kernel-image-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-63-generic-64k"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-63-generic-lpae"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-63-lowlatency"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-cloud-tools-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-cloud-tools-5.8.0-63-lowlatency"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-headers-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-headers-5.8.0-63-generic-64k"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-headers-5.8.0-63-generic-lpae"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-headers-5.8.0-63-lowlatency"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-cloud-tools-5.8.0-63"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-cloud-tools-common"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-headers-5.8.0-63"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-source-5.8.0"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-tools-5.8.0-63"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-tools-common"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-tools-host"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-udebs-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-udebs-generic-64k"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-hwe-5.8-udebs-generic-lpae"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-image-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-image-5.8.0-63-generic-lpae"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-image-unsigned-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-image-unsigned-5.8.0-63-generic-64k"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-image-unsigned-5.8.0-63-lowlatency"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-modules-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-modules-5.8.0-63-generic-64k"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-modules-5.8.0-63-generic-lpae"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-modules-5.8.0-63-lowlatency"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-modules-extra-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-tools-5.8.0-63-generic"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-tools-5.8.0-63-generic-64k"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-tools-5.8.0-63-generic-lpae"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "linux-tools-5.8.0-63-lowlatency"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "md-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "md-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "md-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "message-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "message-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "mouse-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "mouse-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "mouse-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "multipath-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "multipath-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "multipath-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nfs-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nfs-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nfs-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-pcmcia-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-shared-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-shared-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-shared-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-usb-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-usb-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "nic-usb-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "parport-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "parport-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "parport-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "pata-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "pcmcia-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "pcmcia-storage-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "plip-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "plip-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "plip-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "ppp-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "ppp-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "ppp-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "sata-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "sata-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "sata-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "scsi-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "scsi-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "scsi-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "serial-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "storage-core-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "storage-core-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "storage-core-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "usb-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "usb-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "usb-modules-5.8.0-63-generic-lpae-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "virtio-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "virtio-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "vlan-modules-5.8.0-63-generic-64k-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "vlan-modules-5.8.0-63-generic-di"
        },
        {
            "binary_version": "5.8.0-63.71~20.04.1",
            "binary_name": "vlan-modules-5.8.0-63-generic-lpae-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-intel-5.13

Package

Name
linux-intel-5.13
Purl
pkg:deb/ubuntu/linux-intel-5.13@5.13.0-1017.19?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1007.7
5.13.0-1008.8
5.13.0-1009.9
5.13.0-1010.10
5.13.0-1011.11
5.13.0-1014.15
5.13.0-1017.19

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-buildinfo-5.13.0-1017-intel"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-cloud-tools-5.13.0-1017-intel"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-headers-5.13.0-1017-intel"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-image-unsigned-5.13.0-1017-intel"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-intel-5.13-cloud-tools-5.13.0-1017"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-intel-5.13-cloud-tools-common"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-intel-5.13-headers-5.13.0-1017"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-intel-5.13-source-5.13.0"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-intel-5.13-tools-5.13.0-1017"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-intel-5.13-tools-common"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-intel-5.13-tools-host"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-modules-5.13.0-1017-intel"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-modules-extra-5.13.0-1017-intel"
        },
        {
            "binary_version": "5.13.0-1017.19",
            "binary_name": "linux-tools-5.13.0-1017-intel"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-5.10

Package

Name
linux-oem-5.10
Purl
pkg:deb/ubuntu/linux-oem-5.10@5.10.0-1057.61?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.10.0-1008.9
5.10.0-1011.12
5.10.0-1013.14
5.10.0-1014.15
5.10.0-1016.17
5.10.0-1017.18
5.10.0-1019.20
5.10.0-1021.22
5.10.0-1022.23
5.10.0-1023.24
5.10.0-1025.26
5.10.0-1026.27
5.10.0-1029.30
5.10.0-1032.33
5.10.0-1033.34
5.10.0-1034.35
5.10.0-1038.40
5.10.0-1044.46
5.10.0-1045.47
5.10.0-1049.51
5.10.0-1050.52
5.10.0-1051.53
5.10.0-1052.54
5.10.0-1053.55
5.10.0-1055.58
5.10.0-1057.61

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-buildinfo-5.10.0-1057-oem"
        },
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-headers-5.10.0-1057-oem"
        },
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-image-unsigned-5.10.0-1057-oem"
        },
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-modules-5.10.0-1057-oem"
        },
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-oem-5.10-headers-5.10.0-1057"
        },
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-oem-5.10-tools-5.10.0-1057"
        },
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-oem-5.10-tools-host"
        },
        {
            "binary_version": "5.10.0-1057.61",
            "binary_name": "linux-tools-5.10.0-1057-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-5.13

Package

Name
linux-oem-5.13
Purl
pkg:deb/ubuntu/linux-oem-5.13@5.13.0-1029.36?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1009.10
5.13.0-1010.11
5.13.0-1012.16
5.13.0-1014.18
5.13.0-1017.21
5.13.0-1019.23
5.13.0-1020.24
5.13.0-1021.25
5.13.0-1022.26
5.13.0-1026.32
5.13.0-1028.35
5.13.0-1029.36

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-buildinfo-5.13.0-1029-oem"
        },
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-headers-5.13.0-1029-oem"
        },
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-image-unsigned-5.13.0-1029-oem"
        },
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-modules-5.13.0-1029-oem"
        },
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-oem-5.13-headers-5.13.0-1029"
        },
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-oem-5.13-tools-5.13.0-1029"
        },
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-oem-5.13-tools-host"
        },
        {
            "binary_version": "5.13.0-1029.36",
            "binary_name": "linux-tools-5.13.0-1029-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-5.14

Package

Name
linux-oem-5.14
Purl
pkg:deb/ubuntu/linux-oem-5.14@5.14.0-1059.67?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.14.0-1004.4
5.14.0-1005.5
5.14.0-1007.7
5.14.0-1008.8
5.14.0-1010.10
5.14.0-1011.11
5.14.0-1013.13
5.14.0-1018.19
5.14.0-1020.22
5.14.0-1022.24
5.14.0-1024.26
5.14.0-1027.30
5.14.0-1029.32
5.14.0-1031.34
5.14.0-1032.35
5.14.0-1033.36
5.14.0-1034.37
5.14.0-1036.40
5.14.0-1038.42
5.14.0-1042.47
5.14.0-1044.49
5.14.0-1045.51
5.14.0-1046.53
5.14.0-1047.54
5.14.0-1048.55
5.14.0-1049.56
5.14.0-1050.57
5.14.0-1051.58
5.14.0-1052.59
5.14.0-1054.61
5.14.0-1055.62
5.14.0-1056.63
5.14.0-1057.64
5.14.0-1058.66
5.14.0-1059.67

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-buildinfo-5.14.0-1059-oem"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-headers-5.14.0-1059-oem"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-image-unsigned-5.14.0-1059-oem"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-modules-5.14.0-1059-oem"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-modules-iwlwifi-5.14.0-1059-oem"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-oem-5.14-headers-5.14.0-1059"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-oem-5.14-tools-5.14.0-1059"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-oem-5.14-tools-host"
        },
        {
            "binary_version": "5.14.0-1059.67",
            "binary_name": "linux-tools-5.14.0-1059-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-5.6

Package

Name
linux-oem-5.6
Purl
pkg:deb/ubuntu/linux-oem-5.6@5.6.0-1056.60?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.6.0-1007.7
5.6.0-1008.8
5.6.0-1010.10
5.6.0-1011.11
5.6.0-1013.13
5.6.0-1017.17
5.6.0-1018.18
5.6.0-1020.20
5.6.0-1021.21
5.6.0-1023.23
5.6.0-1026.26
5.6.0-1027.27
5.6.0-1028.28
5.6.0-1031.32
5.6.0-1032.33
5.6.0-1033.35
5.6.0-1034.36
5.6.0-1035.37
5.6.0-1036.39
5.6.0-1039.43
5.6.0-1042.46
5.6.0-1047.51
5.6.0-1048.52
5.6.0-1050.54
5.6.0-1052.56
5.6.0-1053.57
5.6.0-1054.58
5.6.0-1055.59
5.6.0-1056.60

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-buildinfo-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-headers-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-image-unsigned-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-modules-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-oem-5.6-headers-5.6.0-1056"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-oem-5.6-tools-5.6.0-1056"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-oem-5.6-tools-host"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-tools-5.6.0-1056-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oracle-5.11

Package

Name
linux-oracle-5.11
Purl
pkg:deb/ubuntu/linux-oracle-5.11@5.11.0-1028.31~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1008.8~20.04.1
5.11.0-1013.14~20.04.1
5.11.0-1016.17~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-buildinfo-5.11.0-1028-oracle"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-headers-5.11.0-1028-oracle"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-image-unsigned-5.11.0-1028-oracle"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-modules-5.11.0-1028-oracle"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-modules-extra-5.11.0-1028-oracle"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-oracle-5.11-headers-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-oracle-5.11-tools-5.11.0-1028"
        },
        {
            "binary_version": "5.11.0-1028.31~20.04.1",
            "binary_name": "linux-tools-5.11.0-1028-oracle"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oracle-5.13

Package

Name
linux-oracle-5.13
Purl
pkg:deb/ubuntu/linux-oracle-5.13@5.13.0-1036.43~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1011.13~20.04.2
5.13.0-1015.19~20.04.1
5.13.0-1016.20~20.04.1
5.13.0-1018.22~20.04.1
5.13.0-1021.26~20.04.1
5.13.0-1025.30~20.04.1
5.13.0-1027.32~20.04.1
5.13.0-1028.33~20.04.1
5.13.0-1030.35~20.04.1
5.13.0-1033.39~20.04.1
5.13.0-1034.40~20.04.1
5.13.0-1036.43~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-buildinfo-5.13.0-1036-oracle"
        },
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-headers-5.13.0-1036-oracle"
        },
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-image-unsigned-5.13.0-1036-oracle"
        },
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-modules-5.13.0-1036-oracle"
        },
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-modules-extra-5.13.0-1036-oracle"
        },
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-oracle-5.13-headers-5.13.0-1036"
        },
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-oracle-5.13-tools-5.13.0-1036"
        },
        {
            "binary_version": "5.13.0-1036.43~20.04.1",
            "binary_name": "linux-tools-5.13.0-1036-oracle"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oracle-5.8

Package

Name
linux-oracle-5.8
Purl
pkg:deb/ubuntu/linux-oracle-5.8@5.8.0-1038.39~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1031.32~20.04.2
5.8.0-1033.34~20.04.1
5.8.0-1034.35~20.04.2
5.8.0-1037.38~20.04.1
5.8.0-1038.39~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-1038-oracle"
        },
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-headers-5.8.0-1038-oracle"
        },
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-image-unsigned-5.8.0-1038-oracle"
        },
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-modules-5.8.0-1038-oracle"
        },
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-modules-extra-5.8.0-1038-oracle"
        },
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-oracle-5.8-headers-5.8.0-1038"
        },
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-oracle-5.8-tools-5.8.0-1038"
        },
        {
            "binary_version": "5.8.0-1038.39~20.04.1",
            "binary_name": "linux-tools-5.8.0-1038-oracle"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-raspi2

Package

Name
linux-raspi2
Purl
pkg:deb/ubuntu/linux-raspi2@5.4.0-1006.6?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1007.8
5.3.0-1014.16
5.3.0-1015.17
5.3.0-1017.19
5.4.0-1004.4
5.4.0-1006.6

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-buildinfo-5.4.0-1006-raspi2"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-headers-5.4.0-1006-raspi2"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-image-5.4.0-1006-raspi2"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-modules-5.4.0-1006-raspi2"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-raspi2-headers-5.4.0-1006"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-raspi2-tools-5.4.0-1006"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-tools-5.4.0-1006-raspi2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-riscv

Package

Name
linux-riscv
Purl
pkg:deb/ubuntu/linux-riscv@5.4.0-40.45?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-24.28
5.4.0-26.30
5.4.0-27.31
5.4.0-28.32
5.4.0-30.34
5.4.0-31.35
5.4.0-33.37
5.4.0-34.38
5.4.0-36.41
5.4.0-37.42
5.4.0-39.44
5.4.0-40.45

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "block-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "crypto-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "fat-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "firewire-core-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "fs-core-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "fs-secondary-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "input-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "ipmi-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "kernel-image-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-buildinfo-5.4.0-40-generic"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-headers-5.4.0-40-generic"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-image-5.4.0-40-generic"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-modules-5.4.0-40-generic"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-modules-extra-5.4.0-40-generic"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-riscv-headers-5.4.0-40"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-riscv-tools-5.4.0-40"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-tools-5.4.0-40-generic"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "linux-udebs-generic"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "md-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "message-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "mouse-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "multipath-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "nfs-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "nic-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "nic-shared-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "nic-usb-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "parport-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "pata-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "plip-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "ppp-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "sata-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "scsi-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "storage-core-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "usb-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "virtio-modules-5.4.0-40-generic-di"
        },
        {
            "binary_version": "5.4.0-40.45",
            "binary_name": "vlan-modules-5.4.0-40-generic-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-riscv-5.11

Package

Name
linux-riscv-5.11
Purl
pkg:deb/ubuntu/linux-riscv-5.11@5.11.0-1031.35?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1015.16~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1018.19~20.04.2
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1024.25~20.04.1
5.11.0-1026.28~20.04.1
5.11.0-1028.31~20.04.1
5.11.0-1029.32~20.04.1
5.11.0-1030.34
5.11.0-1031.35

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-buildinfo-5.11.0-1031-generic"
        },
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-headers-5.11.0-1031-generic"
        },
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-image-5.11.0-1031-generic"
        },
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-modules-5.11.0-1031-generic"
        },
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-modules-extra-5.11.0-1031-generic"
        },
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-riscv-5.11-headers-5.11.0-1031"
        },
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-riscv-5.11-tools-5.11.0-1031"
        },
        {
            "binary_version": "5.11.0-1031.35",
            "binary_name": "linux-tools-5.11.0-1031-generic"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-riscv-5.8

Package

Name
linux-riscv-5.8
Purl
pkg:deb/ubuntu/linux-riscv-5.8@5.8.0-29.31~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-14.16~20.04.1
5.8.0-14.16~20.04.3
5.8.0-16.18~20.04.1
5.8.0-17.19~20.04.1
5.8.0-18.20~20.04.1
5.8.0-20.22~20.04.1
5.8.0-22.24~20.04.1
5.8.0-25.27~20.04.1
5.8.0-26.28~20.04.1
5.8.0-29.31~20.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "block-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "crypto-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "fat-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "firewire-core-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "fs-core-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "fs-secondary-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "input-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "ipmi-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "kernel-image-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-buildinfo-5.8.0-29-generic"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-headers-5.8.0-29-generic"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-image-5.8.0-29-generic"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-modules-5.8.0-29-generic"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-modules-extra-5.8.0-29-generic"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-riscv-5.8-headers-5.8.0-29"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-riscv-5.8-tools-5.8.0-29"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-tools-5.8.0-29-generic"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "linux-udebs-generic"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "md-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "message-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "mouse-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "multipath-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "nfs-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "nic-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "nic-shared-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "nic-usb-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "parport-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "pata-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "plip-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "ppp-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "sata-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "scsi-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "storage-core-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "usb-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "virtio-modules-5.8.0-29-generic-di"
        },
        {
            "binary_version": "5.8.0-29.31~20.04.1",
            "binary_name": "vlan-modules-5.8.0-29-generic-di"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

Ubuntu:22.04:LTS

linux-allwinner-5.19

Package

Name
linux-allwinner-5.19
Purl
pkg:deb/ubuntu/linux-allwinner-5.19@5.19.0-1015.15~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1007.7~22.04.1
5.19.0-1009.9~22.04.1
5.19.0-1010.10~22.04.1
5.19.0-1011.11~22.04.1
5.19.0-1012.12~22.04.1
5.19.0-1013.13~22.04.1
5.19.0-1014.14~22.04.1
5.19.0-1015.15~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-allwinner-5.19-headers-5.19.0-1015"
        },
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-allwinner-5.19-tools-5.19.0-1015"
        },
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-buildinfo-5.19.0-1015-allwinner"
        },
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-headers-5.19.0-1015-allwinner"
        },
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-image-5.19.0-1015-allwinner"
        },
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-modules-5.19.0-1015-allwinner"
        },
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-modules-extra-5.19.0-1015-allwinner"
        },
        {
            "binary_version": "5.19.0-1015.15~22.04.1",
            "binary_name": "linux-tools-5.19.0-1015-allwinner"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-aws-5.19

Package

Name
linux-aws-5.19
Purl
pkg:deb/ubuntu/linux-aws-5.19@5.19.0-1029.30~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1019.20~22.04.1
5.19.0-1020.21~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1024.25~22.04.1
5.19.0-1025.26~22.04.1
5.19.0-1026.27~22.04.1
5.19.0-1027.28~22.04.1
5.19.0-1028.29~22.04.1
5.19.0-1029.30~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-aws-5.19-cloud-tools-5.19.0-1029"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-aws-5.19-headers-5.19.0-1029"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-aws-5.19-tools-5.19.0-1029"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-buildinfo-5.19.0-1029-aws"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-cloud-tools-5.19.0-1029-aws"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-headers-5.19.0-1029-aws"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-image-unsigned-5.19.0-1029-aws"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-modules-5.19.0-1029-aws"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-modules-extra-5.19.0-1029-aws"
        },
        {
            "binary_version": "5.19.0-1029.30~22.04.1",
            "binary_name": "linux-tools-5.19.0-1029-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-aws-6.2

Package

Name
linux-aws-6.2
Purl
pkg:deb/ubuntu/linux-aws-6.2@6.2.0-1018.18~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1010.10~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1018"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-aws-6.2-headers-6.2.0-1018"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-aws-6.2-tools-6.2.0-1018"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-1018-aws"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-cloud-tools-6.2.0-1018-aws"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-headers-6.2.0-1018-aws"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-image-unsigned-6.2.0-1018-aws"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-modules-6.2.0-1018-aws"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-modules-extra-6.2.0-1018-aws"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-tools-6.2.0-1018-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-aws-6.5

Package

Name
linux-aws-6.5
Purl
pkg:deb/ubuntu/linux-aws-6.5@6.5.0-1024.24~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1008.8~22.04.1
6.5.0-1010.10~22.04.1
6.5.0-1011.11~22.04.1
6.5.0-1012.12~22.04.1
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.2
6.5.0-1018.18~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1021.21~22.04.1
6.5.0-1022.22~22.04.1
6.5.0-1023.23~22.04.1
6.5.0-1024.24~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1024"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-aws-6.5-headers-6.5.0-1024"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-aws-6.5-tools-6.5.0-1024"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-1024-aws"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-cloud-tools-6.5.0-1024-aws"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-headers-6.5.0-1024-aws"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-1024-aws"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-modules-6.5.0-1024-aws"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-1024-aws"
        },
        {
            "binary_version": "6.5.0-1024.24~22.04.1",
            "binary_name": "linux-tools-6.5.0-1024-aws"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-5.19

Package

Name
linux-azure-5.19
Purl
pkg:deb/ubuntu/linux-azure-5.19@5.19.0-1027.30~22.04.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1020.21~22.04.1
5.19.0-1021.22~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1025.28~22.04.1
5.19.0-1026.29~22.04.1
5.19.0-1027.30~22.04.2

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-azure-5.19-cloud-tools-5.19.0-1027"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-azure-5.19-headers-5.19.0-1027"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-azure-5.19-tools-5.19.0-1027"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-buildinfo-5.19.0-1027-azure"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-cloud-tools-5.19.0-1027-azure"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-headers-5.19.0-1027-azure"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-image-unsigned-5.19.0-1027-azure"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-modules-5.19.0-1027-azure"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-modules-extra-5.19.0-1027-azure"
        },
        {
            "binary_version": "5.19.0-1027.30~22.04.2",
            "binary_name": "linux-tools-5.19.0-1027-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-6.2

Package

Name
linux-azure-6.2
Purl
pkg:deb/ubuntu/linux-azure-6.2@6.2.0-1019.19~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1
6.2.0-1019.19~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1019"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-azure-6.2-headers-6.2.0-1019"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-azure-6.2-tools-6.2.0-1019"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-1019-azure"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-cloud-tools-6.2.0-1019-azure"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-headers-6.2.0-1019-azure"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-image-unsigned-6.2.0-1019-azure"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-modules-6.2.0-1019-azure"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-modules-extra-6.2.0-1019-azure"
        },
        {
            "binary_version": "6.2.0-1019.19~22.04.1",
            "binary_name": "linux-tools-6.2.0-1019-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-6.5

Package

Name
linux-azure-6.5
Purl
pkg:deb/ubuntu/linux-azure-6.5@6.5.0-1025.26~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1007.7~22.04.1
6.5.0-1009.9~22.04.1
6.5.0-1010.10~22.04.1
6.5.0-1011.11~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.1
6.5.0-1018.19~22.04.2
6.5.0-1019.20~22.04.1
6.5.0-1021.22~22.04.1
6.5.0-1022.23~22.04.1
6.5.0-1023.24~22.04.1
6.5.0-1024.25~22.04.1
6.5.0-1025.26~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1025"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-azure-6.5-headers-6.5.0-1025"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-azure-6.5-tools-6.5.0-1025"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-1025-azure"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-cloud-tools-6.5.0-1025-azure"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-headers-6.5.0-1025-azure"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-1025-azure"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-modules-6.5.0-1025-azure"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-1025-azure"
        },
        {
            "binary_version": "6.5.0-1025.26~22.04.1",
            "binary_name": "linux-tools-6.5.0-1025-azure"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-fde-5.19

Package

Name
linux-azure-fde-5.19
Purl
pkg:deb/ubuntu/linux-azure-fde-5.19@5.19.0-1027.30~22.04.2.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1025.28~22.04.1.1
5.19.0-1026.29~22.04.1.1
5.19.0-1027.30~22.04.2.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1027.30~22.04.2.1",
            "binary_name": "linux-image-unsigned-5.19.0-1027-azure-fde"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-azure-fde-6.2

Package

Name
linux-azure-fde-6.2
Purl
pkg:deb/ubuntu/linux-azure-fde-6.2@6.2.0-1019.19~22.04.1.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1008.8~22.04.1.1
6.2.0-1009.9~22.04.3.1
6.2.0-1011.11~22.04.1.1
6.2.0-1012.12~22.04.1.1
6.2.0-1014.14~22.04.1.1
6.2.0-1015.15~22.04.1.1
6.2.0-1016.16~22.04.1.1
6.2.0-1017.17~22.04.1.1
6.2.0-1018.18~22.04.1.1
6.2.0-1019.19~22.04.1.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-1019.19~22.04.1.1",
            "binary_name": "linux-image-unsigned-6.2.0-1019-azure-fde"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp-5.19

Package

Name
linux-gcp-5.19
Purl
pkg:deb/ubuntu/linux-gcp-5.19@5.19.0-1030.32~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1020.22~22.04.2
5.19.0-1021.23~22.04.1
5.19.0-1022.24~22.04.1
5.19.0-1024.26~22.04.1
5.19.0-1025.27~22.04.1
5.19.0-1026.28~22.04.1
5.19.0-1027.29~22.04.1
5.19.0-1030.32~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-buildinfo-5.19.0-1030-gcp"
        },
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-gcp-5.19-headers-5.19.0-1030"
        },
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-gcp-5.19-tools-5.19.0-1030"
        },
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-headers-5.19.0-1030-gcp"
        },
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-image-unsigned-5.19.0-1030-gcp"
        },
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-modules-5.19.0-1030-gcp"
        },
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-modules-extra-5.19.0-1030-gcp"
        },
        {
            "binary_version": "5.19.0-1030.32~22.04.1",
            "binary_name": "linux-tools-5.19.0-1030-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp-6.2

Package

Name
linux-gcp-6.2
Purl
pkg:deb/ubuntu/linux-gcp-6.2@6.2.0-1021.23~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1009.9~22.04.3
6.2.0-1010.10~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1011.11~22.04.3
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1016.18~22.04.1
6.2.0-1017.19~22.04.1
6.2.0-1018.20~22.04.1
6.2.0-1019.21~22.04.1
6.2.0-1021.23~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-1021-gcp"
        },
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-gcp-6.2-headers-6.2.0-1021"
        },
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-gcp-6.2-tools-6.2.0-1021"
        },
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-headers-6.2.0-1021-gcp"
        },
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-image-unsigned-6.2.0-1021-gcp"
        },
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-modules-6.2.0-1021-gcp"
        },
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-modules-extra-6.2.0-1021-gcp"
        },
        {
            "binary_version": "6.2.0-1021.23~22.04.1",
            "binary_name": "linux-tools-6.2.0-1021-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-gcp-6.5

Package

Name
linux-gcp-6.5
Purl
pkg:deb/ubuntu/linux-gcp-6.5@6.5.0-1025.27~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1010.10~22.04.3
6.5.0-1011.11~22.04.1
6.5.0-1013.13~22.04.1
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.1
6.5.0-1018.18~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1022.24~22.04.1
6.5.0-1023.25~22.04.1
6.5.0-1024.26~22.04.1
6.5.0-1025.27~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-1025-gcp"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-gcp-6.5-headers-6.5.0-1025"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-gcp-6.5-tools-6.5.0-1025"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-headers-6.5.0-1025-gcp"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-1025-gcp"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-modules-6.5.0-1025-gcp"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-1025-gcp"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.5.0-1025-gcp"
        },
        {
            "binary_version": "6.5.0-1025.27~22.04.1",
            "binary_name": "linux-tools-6.5.0-1025-gcp"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-hwe-5.19

Package

Name
linux-hwe-5.19
Purl
pkg:deb/ubuntu/linux-hwe-5.19@5.19.0-50.50?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-28.29~22.04.1
5.19.0-32.33~22.04.1
5.19.0-35.36~22.04.1
5.19.0-38.39~22.04.1
5.19.0-40.41~22.04.1
5.19.0-41.42~22.04.1
5.19.0-42.43~22.04.1
5.19.0-43.44~22.04.1
5.19.0-45.46~22.04.1
5.19.0-46.47~22.04.1
5.19.0-50.50

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-buildinfo-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-buildinfo-5.19.0-50-generic-64k"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-buildinfo-5.19.0-50-generic-lpae"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-cloud-tools-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-headers-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-headers-5.19.0-50-generic-64k"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-headers-5.19.0-50-generic-lpae"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-hwe-5.19-cloud-tools-5.19.0-50"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-hwe-5.19-cloud-tools-common"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-hwe-5.19-headers-5.19.0-50"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-hwe-5.19-tools-5.19.0-50"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-hwe-5.19-tools-common"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-hwe-5.19-tools-host"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-image-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-image-5.19.0-50-generic-lpae"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-image-unsigned-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-image-unsigned-5.19.0-50-generic-64k"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-modules-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-modules-5.19.0-50-generic-64k"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-modules-5.19.0-50-generic-lpae"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-modules-extra-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-modules-ipu6-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-modules-ivsc-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-modules-iwlwifi-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-source-5.19.0"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-tools-5.19.0-50-generic"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-tools-5.19.0-50-generic-64k"
        },
        {
            "binary_version": "5.19.0-50.50",
            "binary_name": "linux-tools-5.19.0-50-generic-lpae"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-hwe-6.2

Package

Name
linux-hwe-6.2
Purl
pkg:deb/ubuntu/linux-hwe-6.2@6.2.0-39.40~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-25.25~22.04.2
6.2.0-26.26~22.04.1
6.2.0-31.31~22.04.1
6.2.0-32.32~22.04.1
6.2.0-33.33~22.04.1
6.2.0-34.34~22.04.1
6.2.0-35.35~22.04.1
6.2.0-36.37~22.04.1
6.2.0-37.38~22.04.1
6.2.0-39.40~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-39-generic-64k"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-39-generic-lpae"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-cloud-tools-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-headers-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-headers-6.2.0-39-generic-64k"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-headers-6.2.0-39-generic-lpae"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-39"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-hwe-6.2-cloud-tools-common"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-hwe-6.2-headers-6.2.0-39"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-hwe-6.2-tools-6.2.0-39"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-hwe-6.2-tools-common"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-hwe-6.2-tools-host"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-image-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-image-6.2.0-39-generic-lpae"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-image-unsigned-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-image-unsigned-6.2.0-39-generic-64k"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-modules-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-modules-6.2.0-39-generic-64k"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-modules-6.2.0-39-generic-lpae"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-modules-extra-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-modules-ipu6-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-modules-ivsc-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-source-6.2.0"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-tools-6.2.0-39-generic"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-tools-6.2.0-39-generic-64k"
        },
        {
            "binary_version": "6.2.0-39.40~22.04.1",
            "binary_name": "linux-tools-6.2.0-39-generic-lpae"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-hwe-6.5

Package

Name
linux-hwe-6.5
Purl
pkg:deb/ubuntu/linux-hwe-6.5@6.5.0-45.45~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-14.14~22.04.1
6.5.0-15.15~22.04.1
6.5.0-17.17~22.04.1
6.5.0-18.18~22.04.1
6.5.0-21.21~22.04.1
6.5.0-25.25~22.04.1
6.5.0-26.26~22.04.1
6.5.0-27.28~22.04.1
6.5.0-28.29~22.04.1
6.5.0-35.35~22.04.1
6.5.0-41.41~22.04.2
6.5.0-44.44~22.04.1
6.5.0-45.45~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-45-generic-64k"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-cloud-tools-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-headers-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-headers-6.5.0-45-generic-64k"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.5-cloud-tools-common"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.5-headers-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.5-tools-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.5-tools-common"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.5-tools-host"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-image-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-45-generic-64k"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-modules-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-modules-6.5.0-45-generic-64k"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-modules-ipu6-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-modules-ivsc-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-source-6.5.0"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-tools-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45~22.04.1",
            "binary_name": "linux-tools-6.5.0-45-generic-64k"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-intel-iot-realtime

Package

Name
linux-intel-iot-realtime
Purl
pkg:deb/ubuntu/linux-intel-iot-realtime@5.15.0-1073.75?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.15.0-1073.75

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-intel-iot-realtime-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-intel-iot-realtime-tools-common"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-intel-iot-realtime-tools-host"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1073.75",
            "binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-lowlatency-hwe-5.19

Package

Name
linux-lowlatency-hwe-5.19
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-5.19@5.19.0-1030.30?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1017.18~22.04.1
5.19.0-1018.19~22.04.1
5.19.0-1021.22~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1024.25~22.04.1
5.19.0-1025.26~22.04.1
5.19.0-1027.28~22.04.1
5.19.0-1028.29~22.04.1
5.19.0-1030.30

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-buildinfo-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-buildinfo-5.19.0-1030-lowlatency-64k"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-cloud-tools-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-headers-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-headers-5.19.0-1030-lowlatency-64k"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency-64k"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-5.19.0-1030"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-common"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-lowlatency-hwe-5.19-headers-5.19.0-1030"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-lowlatency-hwe-5.19-tools-5.19.0-1030"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-lowlatency-hwe-5.19-tools-common"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-lowlatency-hwe-5.19-tools-host"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-modules-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-modules-5.19.0-1030-lowlatency-64k"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-modules-ipu6-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-modules-ivsc-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-modules-iwlwifi-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-tools-5.19.0-1030-lowlatency"
        },
        {
            "binary_version": "5.19.0-1030.30",
            "binary_name": "linux-tools-5.19.0-1030-lowlatency-64k"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-lowlatency-hwe-6.2

Package

Name
linux-lowlatency-hwe-6.2
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-6.2@6.2.0-1018.18~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-1018-lowlatency-64k"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-cloud-tools-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-headers-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-headers-6.2.0-1018-lowlatency-64k"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1018"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1018"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1018"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.2-tools-common"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.2-tools-host"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-modules-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-modules-6.2.0-1018-lowlatency-64k"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-modules-ipu6-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-modules-ivsc-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-tools-6.2.0-1018-lowlatency"
        },
        {
            "binary_version": "6.2.0-1018.18~22.04.1",
            "binary_name": "linux-tools-6.2.0-1018-lowlatency-64k"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-lowlatency-hwe-6.5

Package

Name
linux-lowlatency-hwe-6.5
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-6.5@6.5.0-45.45.1~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-14.14.1~22.04.1
6.5.0-15.15.1.1~22.04.1
6.5.0-17.17.1.1.1~22.04.1
6.5.0-21.21.1~22.04.1
6.5.0-25.25.1~22.04.1
6.5.0-26.26.1~22.04.1
6.5.0-27.28.1~22.04.1
6.5.0-28.29.1~22.04.1
6.5.0-35.35.1~22.04.1
6.5.0-41.41.1~22.04.1
6.5.0-42.42.1~22.04.1
6.5.0-44.44.1~22.04.1
6.5.0-45.45.1~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-45-lowlatency-64k"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-cloud-tools-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-headers-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-headers-6.5.0-45-lowlatency-64k"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-45-lowlatency-64k"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.5-tools-common"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.5-tools-host"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-modules-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-modules-6.5.0-45-lowlatency-64k"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-tools-6.5.0-45-lowlatency"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-tools-6.5.0-45-lowlatency-64k"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-nvidia-6.2

Package

Name
linux-nvidia-6.2
Purl
pkg:deb/ubuntu/linux-nvidia-6.2@6.2.0-1015.15?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1003.3~22.04.1
6.2.0-1009.9
6.2.0-1010.10
6.2.0-1011.11
6.2.0-1012.12
6.2.0-1013.13
6.2.0-1015.15

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-buildinfo-6.2.0-1015-nvidia"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-buildinfo-6.2.0-1015-nvidia-64k"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-headers-6.2.0-1015-nvidia"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-headers-6.2.0-1015-nvidia-64k"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-image-unsigned-6.2.0-1015-nvidia"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-image-unsigned-6.2.0-1015-nvidia-64k"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-modules-6.2.0-1015-nvidia"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-modules-6.2.0-1015-nvidia-64k"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-modules-extra-6.2.0-1015-nvidia"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia-64k"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-nvidia-6.2-headers-6.2.0-1015"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-nvidia-6.2-tools-6.2.0-1015"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-nvidia-6.2-tools-host"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-tools-6.2.0-1015-nvidia"
        },
        {
            "binary_version": "6.2.0-1015.15",
            "binary_name": "linux-tools-6.2.0-1015-nvidia-64k"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-nvidia-6.5

Package

Name
linux-nvidia-6.5
Purl
pkg:deb/ubuntu/linux-nvidia-6.5@6.5.0-1024.25?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1004.4
6.5.0-1007.7
6.5.0-1013.13
6.5.0-1014.14
6.5.0-1015.15
6.5.0-1018.18
6.5.0-1019.19
6.5.0-1021.22
6.5.0-1022.23
6.5.0-1023.24
6.5.0-1024.25

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-buildinfo-6.5.0-1024-nvidia"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-buildinfo-6.5.0-1024-nvidia-64k"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-headers-6.5.0-1024-nvidia"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-headers-6.5.0-1024-nvidia-64k"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-image-unsigned-6.5.0-1024-nvidia"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-image-unsigned-6.5.0-1024-nvidia-64k"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-modules-6.5.0-1024-nvidia"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-modules-6.5.0-1024-nvidia-64k"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-modules-extra-6.5.0-1024-nvidia"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia-64k"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-nvidia-6.5-headers-6.5.0-1024"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-nvidia-6.5-tools-6.5.0-1024"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-nvidia-6.5-tools-host"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-tools-6.5.0-1024-nvidia"
        },
        {
            "binary_version": "6.5.0-1024.25",
            "binary_name": "linux-tools-6.5.0-1024-nvidia-64k"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-5.17

Package

Name
linux-oem-5.17
Purl
pkg:deb/ubuntu/linux-oem-5.17@5.17.0-1035.36?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.17.0-1003.3
5.17.0-1004.4
5.17.0-1006.6
5.17.0-1011.12
5.17.0-1012.13
5.17.0-1013.14
5.17.0-1014.15
5.17.0-1015.16
5.17.0-1016.17
5.17.0-1017.18
5.17.0-1018.19
5.17.0-1019.20
5.17.0-1020.21
5.17.0-1021.22
5.17.0-1024.25
5.17.0-1025.26
5.17.0-1026.27
5.17.0-1027.28
5.17.0-1028.29
5.17.0-1029.30
5.17.0-1030.31
5.17.0-1031.32
5.17.0-1032.33
5.17.0-1033.34
5.17.0-1034.35
5.17.0-1035.36

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-buildinfo-5.17.0-1035-oem"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-headers-5.17.0-1035-oem"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-image-unsigned-5.17.0-1035-oem"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-modules-5.17.0-1035-oem"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-modules-ipu6-5.17.0-1035-oem"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-modules-ivsc-5.17.0-1035-oem"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-modules-iwlwifi-5.17.0-1035-oem"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-oem-5.17-headers-5.17.0-1035"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-oem-5.17-tools-5.17.0-1035"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-oem-5.17-tools-host"
        },
        {
            "binary_version": "5.17.0-1035.36",
            "binary_name": "linux-tools-5.17.0-1035-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-6.0

Package

Name
linux-oem-6.0
Purl
pkg:deb/ubuntu/linux-oem-6.0@6.0.0-1021.21?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.0.0-1006.6
6.0.0-1007.7
6.0.0-1008.8
6.0.0-1009.9
6.0.0-1010.10
6.0.0-1011.11
6.0.0-1012.12
6.0.0-1013.13
6.0.0-1014.14
6.0.0-1015.15
6.0.0-1016.16
6.0.0-1017.17
6.0.0-1018.18
6.0.0-1019.19
6.0.0-1020.20
6.0.0-1021.21

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-buildinfo-6.0.0-1021-oem"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-headers-6.0.0-1021-oem"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-image-unsigned-6.0.0-1021-oem"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-modules-6.0.0-1021-oem"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-modules-ipu6-6.0.0-1021-oem"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-modules-ivsc-6.0.0-1021-oem"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-modules-iwlwifi-6.0.0-1021-oem"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-oem-6.0-headers-6.0.0-1021"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-oem-6.0-tools-6.0.0-1021"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-oem-6.0-tools-host"
        },
        {
            "binary_version": "6.0.0-1021.21",
            "binary_name": "linux-tools-6.0.0-1021-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-6.1

Package

Name
linux-oem-6.1
Purl
pkg:deb/ubuntu/linux-oem-6.1@6.1.0-1036.36?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.1.0-1004.4
6.1.0-1006.6
6.1.0-1007.7
6.1.0-1008.8
6.1.0-1009.9
6.1.0-1010.10
6.1.0-1012.12
6.1.0-1013.13
6.1.0-1014.14
6.1.0-1015.15
6.1.0-1016.16
6.1.0-1017.17
6.1.0-1019.19
6.1.0-1020.20
6.1.0-1021.21
6.1.0-1022.22
6.1.0-1023.23
6.1.0-1024.24
6.1.0-1025.25
6.1.0-1026.26
6.1.0-1027.27
6.1.0-1028.28
6.1.0-1029.29
6.1.0-1033.33
6.1.0-1034.34
6.1.0-1035.35
6.1.0-1036.36

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-buildinfo-6.1.0-1036-oem"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-headers-6.1.0-1036-oem"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-image-unsigned-6.1.0-1036-oem"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-modules-6.1.0-1036-oem"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-modules-ipu6-6.1.0-1036-oem"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-modules-ivsc-6.1.0-1036-oem"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-modules-iwlwifi-6.1.0-1036-oem"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-oem-6.1-headers-6.1.0-1036"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-oem-6.1-tools-6.1.0-1036"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-oem-6.1-tools-host"
        },
        {
            "binary_version": "6.1.0-1036.36",
            "binary_name": "linux-tools-6.1.0-1036-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oem-6.5

Package

Name
linux-oem-6.5
Purl
pkg:deb/ubuntu/linux-oem-6.5@6.5.0-1027.28?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1003.3
6.5.0-1004.4
6.5.0-1006.6
6.5.0-1007.7
6.5.0-1008.8
6.5.0-1009.10
6.5.0-1011.12
6.5.0-1013.14
6.5.0-1014.15
6.5.0-1015.16
6.5.0-1016.17
6.5.0-1018.19
6.5.0-1019.20
6.5.0-1020.21
6.5.0-1022.23
6.5.0-1023.24
6.5.0-1024.25
6.5.0-1025.26
6.5.0-1027.28

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-buildinfo-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-headers-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-image-unsigned-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-modules-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-modules-ipu6-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-modules-ivsc-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-modules-iwlwifi-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-modules-usbio-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-oem-6.5-headers-6.5.0-1027"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-oem-6.5-lib-rust-6.5.0-1027-oem"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-oem-6.5-tools-6.5.0-1027"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-oem-6.5-tools-host"
        },
        {
            "binary_version": "6.5.0-1027.28",
            "binary_name": "linux-tools-6.5.0-1027-oem"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-oracle-6.5

Package

Name
linux-oracle-6.5
Purl
pkg:deb/ubuntu/linux-oracle-6.5@6.5.0-1027.27~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1013.13~22.04.4
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1018.18~22.04.1
6.5.0-1019.19~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1021.21~22.04.1
6.5.0-1023.23~22.04.1
6.5.0-1024.24~22.04.1
6.5.0-1025.25~22.04.1
6.5.0-1026.26~22.04.1
6.5.0-1027.27~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-1027-oracle"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-1027-oracle-64k"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-headers-6.5.0-1027-oracle"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-headers-6.5.0-1027-oracle-64k"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-1027-oracle"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-image-unsigned-6.5.0-1027-oracle-64k"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-modules-6.5.0-1027-oracle"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-modules-6.5.0-1027-oracle-64k"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-1027-oracle"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-1027-oracle-64k"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-oracle-6.5-headers-6.5.0-1027"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-oracle-6.5-tools-6.5.0-1027"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-tools-6.5.0-1027-oracle"
        },
        {
            "binary_version": "6.5.0-1027.27~22.04.1",
            "binary_name": "linux-tools-6.5.0-1027-oracle-64k"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-realtime

Package

Name
linux-realtime
Purl
pkg:deb/ubuntu/linux-realtime@5.15.0-1032.35?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.15.0-1032.35

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-buildinfo-5.15.0-1032-realtime"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-cloud-tools-5.15.0-1032-realtime"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-headers-5.15.0-1032-realtime"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-image-unsigned-5.15.0-1032-realtime"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-modules-5.15.0-1032-realtime"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-modules-extra-5.15.0-1032-realtime"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-realtime-cloud-tools-5.15.0-1032"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-realtime-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-realtime-headers-5.15.0-1032"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-realtime-tools-5.15.0-1032"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-realtime-tools-common"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-realtime-tools-host"
        },
        {
            "binary_version": "5.15.0-1032.35",
            "binary_name": "linux-tools-5.15.0-1032-realtime"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-riscv

Package

Name
linux-riscv
Purl
pkg:deb/ubuntu/linux-riscv@5.15.0-1028.32?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1004.4
5.13.0-1006.6+22.04.1
5.13.0-1007.7+22.04.1
5.13.0-1010.11+22.04.1
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1007.7
5.15.0-1008.8
5.15.0-1011.12
5.15.0-1012.13
5.15.0-1014.16
5.15.0-1015.17
5.15.0-1016.18
5.15.0-1017.19
5.15.0-1018.21
5.15.0-1019.22
5.15.0-1020.23
5.15.0-1022.26
5.15.0-1023.27
5.15.0-1026.30
5.15.0-1027.31
5.15.0-1028.32

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-buildinfo-5.15.0-1028-generic"
        },
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-headers-5.15.0-1028-generic"
        },
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-image-5.15.0-1028-generic"
        },
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-modules-5.15.0-1028-generic"
        },
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-modules-extra-5.15.0-1028-generic"
        },
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-riscv-headers-5.15.0-1028"
        },
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-riscv-tools-5.15.0-1028"
        },
        {
            "binary_version": "5.15.0-1028.32",
            "binary_name": "linux-tools-5.15.0-1028-generic"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-riscv-5.19

Package

Name
linux-riscv-5.19
Purl
pkg:deb/ubuntu/linux-riscv-5.19@5.19.0-1021.23~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1012.13~22.04.1
5.19.0-1015.16~22.04.1
5.19.0-1016.17~22.04.1
5.19.0-1017.18~22.04.1
5.19.0-1018.19~22.04.1
5.19.0-1019.21~22.04.1
5.19.0-1020.22~22.04.1
5.19.0-1021.23~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-buildinfo-5.19.0-1021-generic"
        },
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-headers-5.19.0-1021-generic"
        },
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-image-5.19.0-1021-generic"
        },
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-modules-5.19.0-1021-generic"
        },
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-modules-extra-5.19.0-1021-generic"
        },
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-riscv-5.19-headers-5.19.0-1021"
        },
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-riscv-5.19-tools-5.19.0-1021"
        },
        {
            "binary_version": "5.19.0-1021.23~22.04.1",
            "binary_name": "linux-tools-5.19.0-1021-generic"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-riscv-6.5

Package

Name
linux-riscv-6.5
Purl
pkg:deb/ubuntu/linux-riscv-6.5@6.5.0-45.45.1~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-17.17.1.1~22.04.1
6.5.0-21.21.1~22.04.1
6.5.0-25.25.1~22.04.1
6.5.0-26.26.1~22.04.1
6.5.0-27.28.1~22.04.1
6.5.0-28.29.1~22.04.1
6.5.0-35.35.1~22.04.1
6.5.0-40.40.1~22.04.1
6.5.0-42.42.1~22.04.1
6.5.0-45.45.1~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-headers-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-image-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-modules-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-45-generic"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-riscv-6.5-headers-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-riscv-6.5-tools-6.5.0-45"
        },
        {
            "binary_version": "6.5.0-45.45.1~22.04.1",
            "binary_name": "linux-tools-6.5.0-45-generic"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-starfive-5.19

Package

Name
linux-starfive-5.19
Purl
pkg:deb/ubuntu/linux-starfive-5.19@5.19.0-1020.22~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1014.16~22.04.1
5.19.0-1015.17~22.04.1
5.19.0-1016.18~22.04.1
5.19.0-1017.19~22.04.1
5.19.0-1018.20~22.04.1
5.19.0-1019.21~22.04.1
5.19.0-1020.22~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-buildinfo-5.19.0-1020-starfive"
        },
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-headers-5.19.0-1020-starfive"
        },
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-image-5.19.0-1020-starfive"
        },
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-modules-5.19.0-1020-starfive"
        },
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-modules-extra-5.19.0-1020-starfive"
        },
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-starfive-5.19-headers-5.19.0-1020"
        },
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-starfive-5.19-tools-5.19.0-1020"
        },
        {
            "binary_version": "5.19.0-1020.22~22.04.1",
            "binary_name": "linux-tools-5.19.0-1020-starfive"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-starfive-6.2

Package

Name
linux-starfive-6.2
Purl
pkg:deb/ubuntu/linux-starfive-6.2@6.2.0-1009.10~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1006.7~22.04.1
6.2.0-1007.8~22.04.1
6.2.0-1009.10~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-buildinfo-6.2.0-1009-starfive"
        },
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-headers-6.2.0-1009-starfive"
        },
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-image-6.2.0-1009-starfive"
        },
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-modules-6.2.0-1009-starfive"
        },
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-modules-extra-6.2.0-1009-starfive"
        },
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-starfive-6.2-headers-6.2.0-1009"
        },
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-starfive-6.2-tools-6.2.0-1009"
        },
        {
            "binary_version": "6.2.0-1009.10~22.04.1",
            "binary_name": "linux-tools-6.2.0-1009-starfive"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

linux-starfive-6.5

Package

Name
linux-starfive-6.5
Purl
pkg:deb/ubuntu/linux-starfive-6.5@6.5.0-1018.19~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1007.8~22.04.1
6.5.0-1008.9~22.04.1
6.5.0-1009.10~22.04.1
6.5.0-1010.11~22.04.1
6.5.0-1011.12~22.04.1
6.5.0-1012.13~22.04.1
6.5.0-1014.15~22.04.1
6.5.0-1015.16~22.04.1
6.5.0-1016.17~22.04.1
6.5.0-1017.18~22.04.1
6.5.0-1018.19~22.04.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "binaries": [
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-buildinfo-6.5.0-1018-starfive"
        },
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-headers-6.5.0-1018-starfive"
        },
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-image-6.5.0-1018-starfive"
        },
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-modules-6.5.0-1018-starfive"
        },
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-modules-extra-6.5.0-1018-starfive"
        },
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-starfive-6.5-headers-6.5.0-1018"
        },
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-starfive-6.5-tools-6.5.0-1018"
        },
        {
            "binary_version": "6.5.0-1018.19~22.04.1",
            "binary_name": "linux-tools-6.5.0-1018-starfive"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"

Ubuntu:Pro:24.04:LTS:Realtime:Kernel

linux-raspi-realtime

Package

Name
linux-raspi-realtime
Purl
pkg:deb/ubuntu/linux-raspi-realtime@6.8.0-2002.2?arch=source&distro=realtime/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-2002.2

Affected versions

6.*

6.7.0-2001.1
6.8.0-2001.1

Ecosystem specific

{
    "priority_reason": "This issue is a failure to deallocate memory, leading to a potential denial of service only on systems that have been configured to use zswap, which is not a default Ubuntu system configuration.",
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "6.8.0-2002.2",
            "binary_name": "linux-buildinfo-6.8.0-2002-raspi-realtime"
        },
        {
            "binary_version": "6.8.0-2002.2",
            "binary_name": "linux-headers-6.8.0-2002-raspi-realtime"
        },
        {
            "binary_version": "6.8.0-2002.2",
            "binary_name": "linux-image-6.8.0-2002-raspi-realtime"
        },
        {
            "binary_version": "6.8.0-2002.2",
            "binary_name": "linux-modules-6.8.0-2002-raspi-realtime"
        },
        {
            "binary_version": "6.8.0-2002.2",
            "binary_name": "linux-raspi-realtime-headers-6.8.0-2002"
        },
        {
            "binary_version": "6.8.0-2002.2",
            "binary_name": "linux-raspi-realtime-tools-6.8.0-2002"
        },
        {
            "binary_version": "6.8.0-2002.2",
            "binary_name": "linux-tools-6.8.0-2002-raspi-realtime"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-26832.json"