In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2capconnect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hcirxwork Call Trace: <TASK> _dumpstack lib/dumpstack.c:93 [inline] dumpstacklvl+0x116/0x1f0 lib/dumpstack.c:119 printaddressdescription mm/kasan/report.c:377 [inline] printreport+0xc3/0x620 mm/kasan/report.c:488 kasanreport+0xd9/0x110 mm/kasan/report.c:601 l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 l2capconnectreq net/bluetooth/l2capcore.c:4080 [inline] l2capbredrsigcmd net/bluetooth/l2capcore.c:4772 [inline] l2capsigchannel net/bluetooth/l2capcore.c:5543 [inline] l2caprecvframe+0xf0b/0x8eb0 net/bluetooth/l2capcore.c:6825 l2caprecvacldata+0x9b4/0xb70 net/bluetooth/l2capcore.c:7514 hciacldatapacket net/bluetooth/hcicore.c:3791 [inline] hcirxwork+0xaab/0x1610 net/bluetooth/hcicore.c:4028 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244 ... Freed by task 5245: kasansavestack+0x33/0x60 mm/kasan/common.c:47 kasansavetrack+0x14/0x30 mm/kasan/common.c:68 kasansavefreeinfo+0x3b/0x60 mm/kasan/generic.c:579 poisonslabobject+0xf7/0x160 mm/kasan/common.c:240 _kasanslabfree+0x32/0x50 mm/kasan/common.c:256 kasanslabfree include/linux/kasan.h:184 [inline] slabfreehook mm/slub.c:2256 [inline] slabfree mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2capconnfree net/bluetooth/l2capcore.c:1810 [inline] krefput include/linux/kref.h:65 [inline] l2capconnput net/bluetooth/l2capcore.c:1822 [inline] l2capconndel+0x59d/0x730 net/bluetooth/l2capcore.c:1802 l2capconnectcfm+0x9e6/0xf80 net/bluetooth/l2capcore.c:7241 hciconnectcfm include/net/bluetooth/hcicore.h:1960 [inline] hciconnfailed+0x1c3/0x370 net/bluetooth/hciconn.c:1265 hciabortconnsync+0x75a/0xb50 net/bluetooth/hcisync.c:5583 abortconnsync+0x197/0x360 net/bluetooth/hciconn.c:2917 hcicmdsyncwork+0x1a4/0x410 net/bluetooth/hcisync.c:328 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244
{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "block-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "dasd-extra-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "dasd-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "firewire-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "floppy-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-cloud-tools-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-tools-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-udebs-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-udebs-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "message-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pata-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pcmcia-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "serial-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "virtio-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-5.0-tools-5.0.0-1027",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-aws-headers-5.0.0-1027",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-buildinfo-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-headers-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-image-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-modules-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-modules-extra-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-tools-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-5.3-cloud-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-aws-5.3-headers-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-aws-5.3-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-buildinfo-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-cloud-tools-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-headers-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-image-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-modules-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-modules-extra-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-tools-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-azure-headers-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-azure-tools-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-buildinfo-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-headers-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-modules-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-modules-extra-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-tools-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-5.3-cloud-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-azure-5.3-headers-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-azure-5.3-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-buildinfo-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-cloud-tools-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-headers-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-modules-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-modules-extra-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-tools-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-edge-cloud-tools-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-azure-edge-tools-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-azure-headers-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-headers-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-modules-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-modules-extra-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-tools-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-gcp-headers-5.0.0-1034",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-gcp-tools-5.0.0-1034",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-headers-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-modules-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-modules-extra-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-tools-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-gcp-5.3-headers-5.3.0-1032",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-gcp-5.3-tools-5.3.0-1032",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-headers-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-modules-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-tools-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-gke-4.15-headers-4.15.0-1079",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-gke-4.15-tools-4.15.0-1079",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-headers-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-modules-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-modules-extra-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-tools-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-gke-5.4-headers-5.4.0-1080",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-gke-5.4-tools-5.4.0-1080",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-headers-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-source-5.4.0",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-tools-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "crypto-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fat-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "firewire-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "floppy-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fs-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fs-secondary-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "input-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "ipmi-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "kernel-image-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-buildinfo-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-buildinfo-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-cloud-tools-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-cloud-tools-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-headers-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-headers-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-cloud-tools-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-headers-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-tools-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-udebs-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-unsigned-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-unsigned-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-extra-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-source-5.3.0",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-tools-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-tools-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "md-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "message-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "mouse-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "multipath-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nfs-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-pcmcia-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-shared-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-usb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "parport-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pata-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pcmcia-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pcmcia-storage-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "plip-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "ppp-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "sata-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "scsi-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "serial-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "storage-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "usb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "virtio-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "vlan-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "block-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "crypto-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "crypto-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "dasd-extra-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "dasd-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fat-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fat-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "firewire-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "floppy-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-core-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-secondary-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-secondary-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "input-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "input-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ipmi-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ipmi-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "kernel-image-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "kernel-image-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-cloud-tools-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-tools-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-udebs-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-udebs-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-extra-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-source-5.3.0",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "md-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "md-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "message-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "mouse-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "mouse-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "multipath-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "multipath-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nfs-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nfs-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-pcmcia-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-shared-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-shared-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-usb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-usb-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "parport-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "parport-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pata-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pcmcia-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pcmcia-storage-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "plip-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "plip-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ppp-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ppp-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "sata-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "sata-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "scsi-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "scsi-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "serial-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "storage-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "storage-core-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "usb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "usb-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "virtio-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "vlan-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "vlan-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "crypto-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fat-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "firewire-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "floppy-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fs-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fs-secondary-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "input-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "ipmi-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "irda-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "kernel-image-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-buildinfo-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-headers-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-modules-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-oem-headers-4.15.0-1103",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-oem-tools-4.15.0-1103",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-tools-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-udebs-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "md-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "message-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "mouse-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "multipath-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nfs-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-shared-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-usb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "parport-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pata-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pcmcia-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "plip-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "ppp-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "sata-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "scsi-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "serial-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "storage-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "usb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "virtio-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "vlan-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-headers-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-modules-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-modules-extra-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-oracle-5.0-headers-5.0.0-1014",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-oracle-5.0-tools-5.0.0-1014",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-tools-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-headers-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-modules-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-oracle-5.3-headers-5.3.0-1030",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-oracle-5.3-tools-5.3.0-1030",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-tools-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-aws-5.15-headers-5.15.0-1080",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-aws-5.15-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1086",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-azure-5.15-headers-5.15.0-1086",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-azure-5.15-tools-5.15.0-1086",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-modules-involflt-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1086-azure",
"binary_version": "5.15.0-1086.95~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1081-gcp",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-gcp-5.15-headers-5.15.0-1081",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-gcp-5.15-tools-5.15.0-1081",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1081-gcp",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1081-gcp",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1081-gcp",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1081-gcp",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1081-gcp",
"binary_version": "5.15.0-1081.90~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1081-gcp",
"binary_version": "5.15.0-1081.90~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-136-generic-64k",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-136-generic-lpae",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-136-generic-64k",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-136-generic-lpae",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-136",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-headers-5.15.0-136",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-tools-5.15.0-136",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-136-generic-lpae",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-136-generic-64k",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-136-generic-64k",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-136-generic-lpae",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-136-generic",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-136-generic-64k",
"binary_version": "5.15.0-136.147~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-136-generic-lpae",
"binary_version": "5.15.0-136.147~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1074-ibm",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1074-ibm",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-ibm-5.15-headers-5.15.0-1074",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-ibm-5.15-source-5.15.0",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-ibm-5.15-tools-5.15.0-1074",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1074-ibm",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1074-ibm",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1074-ibm",
"binary_version": "5.15.0-1074.77~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1074-ibm",
"binary_version": "5.15.0-1074.77~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1077",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-cloud-tools-common",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1077",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1077",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-common",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-host",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1077-intel-iotg",
"binary_version": "5.15.0-1077.83~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-135",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-135",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-135",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-oracle-5.15-headers-5.15.0-1077",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-oracle-5.15-tools-5.15.0-1077",
"binary_version": "5.15.0-1077.83~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1075-generic",
"binary_version": "5.15.0-1075.79~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1075-generic",
"binary_version": "5.15.0-1075.79~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-1075-generic",
"binary_version": "5.15.0-1075.79~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1075-generic",
"binary_version": "5.15.0-1075.79~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1075-generic",
"binary_version": "5.15.0-1075.79~20.04.1"
},
{
"binary_name": "linux-riscv-5.15-headers-5.15.0-1075",
"binary_version": "5.15.0-1075.79~20.04.1"
},
{
"binary_name": "linux-riscv-5.15-tools-5.15.0-1075",
"binary_version": "5.15.0-1075.79~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1075-generic",
"binary_version": "5.15.0-1075.79~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-5.11-cloud-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-aws-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-aws-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-aws-5.13-headers-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-aws-5.13-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-5.8-cloud-tools-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-aws-5.8-headers-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-aws-5.8-tools-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-5.11-cloud-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-azure-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-azure-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-buildinfo-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-cloud-tools-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-headers-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-modules-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-tools-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-5.13-cloud-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-azure-5.13-headers-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-azure-5.13-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-5.8-cloud-tools-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-azure-5.8-headers-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-azure-5.8-tools-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-image-unsigned-5.4.0-1103-azure-fde",
"binary_version": "5.4.0-1103.109+cvm1.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-gcp-5.11-headers-5.11.0-1029",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-gcp-5.11-tools-5.11.0-1029",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-headers-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-modules-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-modules-extra-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-tools-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-headers-5.13.0-1033",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-tools-5.13.0-1033",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-gcp-5.8-headers-5.8.0-1039",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-gcp-5.8-tools-5.8.0-1039",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-headers-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-modules-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-modules-extra-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-tools-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-gke-headers-5.4.0-1105",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-gke-tools-5.4.0-1105",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-headers-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-modules-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-modules-extra-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-tools-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-gke-5.15-headers-5.15.0-1039",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-gke-5.15-tools-5.15.0-1039",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-cloud-tools-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-headers-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-source-5.4.0",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-tools-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-headers-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-modules-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-modules-extra-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-tools-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-headers-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-tools-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "block-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "block-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "dasd-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "floppy-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-cloud-tools-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-cloud-tools-common",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-headers-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-source-5.11.0",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-common",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-host",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "message-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "message-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pata-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "serial-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "virtio-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "virtio-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "block-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "block-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "dasd-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "floppy-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-cloud-tools-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-cloud-tools-common",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-headers-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-source-5.13.0",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-common",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-host",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "message-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "message-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pata-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "serial-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "virtio-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "virtio-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "block-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "block-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "dasd-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "floppy-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-cloud-tools-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-cloud-tools-common",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-headers-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-source-5.8.0",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-common",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-host",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pata-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "serial-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-headers-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-cloud-tools-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-cloud-tools-common",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-headers-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-source-5.13.0",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-common",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-host",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-modules-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-modules-extra-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-tools-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-headers-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-image-unsigned-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-modules-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-headers-5.10.0-1057",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-tools-5.10.0-1057",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-tools-host",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-tools-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-headers-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-modules-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-headers-5.13.0-1029",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-tools-5.13.0-1029",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-tools-host",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-tools-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-headers-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-image-unsigned-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-modules-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-modules-iwlwifi-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-headers-5.14.0-1059",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-tools-5.14.0-1059",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-tools-host",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-tools-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-headers-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-image-unsigned-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-modules-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-headers-5.6.0-1056",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-tools-5.6.0-1056",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-tools-host",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-tools-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-oracle-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-oracle-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-oracle-5.13-headers-5.13.0-1036",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-oracle-5.13-tools-5.13.0-1036",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-oracle-5.8-headers-5.8.0-1038",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-oracle-5.8-tools-5.8.0-1038",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-headers-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-image-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-modules-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-raspi2-headers-5.4.0-1006",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-raspi2-tools-5.4.0-1006",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-tools-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "crypto-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fat-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "firewire-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fs-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fs-secondary-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "input-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "ipmi-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "kernel-image-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-buildinfo-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-headers-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-image-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-modules-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-modules-extra-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-riscv-headers-5.4.0-40",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-riscv-tools-5.4.0-40",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-tools-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "md-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "message-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "mouse-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "multipath-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nfs-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-shared-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-usb-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "parport-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "pata-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "plip-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "ppp-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "sata-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "scsi-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "storage-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "usb-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "virtio-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "vlan-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-headers-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-image-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-modules-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-modules-extra-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-riscv-5.11-headers-5.11.0-1031",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-riscv-5.11-tools-5.11.0-1031",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-tools-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-riscv-5.8-headers-5.8.0-29",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-riscv-5.8-tools-5.8.0-29",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "pata-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-buildinfo-5.15.0-135-generic-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-buildinfo-5.15.0-135-generic-lpae",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-cloud-tools-5.15.0-135",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-cloud-tools-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-headers-5.15.0-135",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-headers-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-headers-5.15.0-135-generic-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-headers-5.15.0-135-generic-lpae",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-image-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-image-5.15.0-135-generic-lpae",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-image-unsigned-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-image-unsigned-5.15.0-135-generic-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-5.15.0-135-generic-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-5.15.0-135-generic-lpae",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-extra-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-source-5.15.0",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-5.15.0-135",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-5.15.0-135-generic",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-5.15.0-135-generic-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-5.15.0-135-generic-lpae",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-common",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-host",
"binary_version": "5.15.0-135.146"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-allwinner-5.19-headers-5.19.0-1015",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-allwinner-5.19-tools-5.19.0-1015",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-buildinfo-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-aws-headers-5.15.0-1080",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-aws-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-buildinfo-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-headers-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-modules-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-modules-extra-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87"
},
{
"binary_name": "linux-tools-5.15.0-1080-aws",
"binary_version": "5.15.0-1080.87"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-5.19-cloud-tools-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-aws-5.19-headers-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-aws-5.19-tools-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-buildinfo-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-aws-6.2-headers-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-aws-6.2-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-aws-6.5-headers-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-aws-6.5-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1023",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-aws-6.8-headers-6.8.0-1023",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-aws-6.8-tools-6.8.0-1023",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.15.0-1084",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-azure-headers-5.15.0-1084",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-azure-tools-5.15.0-1084",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-buildinfo-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-headers-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-modules-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-modules-extra-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-modules-involflt-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
},
{
"binary_name": "linux-tools-5.15.0-1084-azure",
"binary_version": "5.15.0-1084.93"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-5.19-cloud-tools-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-azure-5.19-headers-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-azure-5.19-tools-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-buildinfo-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-headers-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-modules-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-modules-extra-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-tools-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-azure-6.2-headers-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-azure-6.2-tools-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-azure-6.5-headers-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-azure-6.5-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1025",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-azure-6.8-headers-6.8.0-1025",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-azure-6.8-tools-6.8.0-1025",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-modules-involflt-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-image-unsigned-5.15.0-1098-azure-fde",
"binary_version": "5.15.0-1098.107.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-image-unsigned-5.19.0-1027-azure-fde",
"binary_version": "5.19.0-1027.30~22.04.2.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-image-unsigned-6.2.0-1019-azure-fde",
"binary_version": "6.2.0-1019.19~22.04.1.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1079-gcp",
"binary_version": "5.15.0-1079.88"
},
{
"binary_name": "linux-gcp-headers-5.15.0-1079",
"binary_version": "5.15.0-1079.88"
},
{
"binary_name": "linux-gcp-tools-5.15.0-1079",
"binary_version": "5.15.0-1079.88"
},
{
"binary_name": "linux-headers-5.15.0-1079-gcp",
"binary_version": "5.15.0-1079.88"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1079-gcp",
"binary_version": "5.15.0-1079.88"
},
{
"binary_name": "linux-modules-5.15.0-1079-gcp",
"binary_version": "5.15.0-1079.88"
},
{
"binary_name": "linux-modules-extra-5.15.0-1079-gcp",
"binary_version": "5.15.0-1079.88"
},
{
"binary_name": "linux-tools-5.15.0-1079-gcp",
"binary_version": "5.15.0-1079.88"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-gcp-5.19-headers-5.19.0-1030",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-gcp-5.19-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-gcp-6.2-headers-6.2.0-1021",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-gcp-6.2-tools-6.2.0-1021",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-gcp-6.5-headers-6.5.0-1025",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-gcp-6.5-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-gcp-6.8-headers-6.8.0-1024",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-gcp-6.8-tools-6.8.0-1024",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1077-gke",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-gke-headers-5.15.0-1077",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-gke-tools-5.15.0-1077",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-headers-5.15.0-1077-gke",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1077-gke",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-modules-5.15.0-1077-gke",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-modules-extra-5.15.0-1077-gke",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-tools-5.15.0-1077-gke",
"binary_version": "5.15.0-1077.83"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1062-gkeop",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1062-gkeop",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-gkeop-cloud-tools-5.15.0-1062",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-gkeop-headers-5.15.0-1062",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-gkeop-tools-5.15.0-1062",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-headers-5.15.0-1062-gkeop",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1062-gkeop",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-modules-5.15.0-1062-gkeop",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-modules-extra-5.15.0-1062-gkeop",
"binary_version": "5.15.0-1062.70"
},
{
"binary_name": "linux-tools-5.15.0-1062-gkeop",
"binary_version": "5.15.0-1062.70"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-buildinfo-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-buildinfo-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-cloud-tools-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-cloud-tools-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-cloud-tools-common",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-headers-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-common",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-host",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-unsigned-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-unsigned-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-extra-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-ipu6-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-ivsc-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-iwlwifi-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-source-5.19.0",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-cloud-tools-common",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-headers-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-common",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-host",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-source-6.2.0",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-cloud-tools-common",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-common",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-host",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-source-6.5.0",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-57-generic-64k",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-57-generic-64k",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-57",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-hwe-6.8-headers-6.8.0-57",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-hwe-6.8-tools-6.8.0-57",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-image-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-57-generic-64k",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-57-generic-64k",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-modules-usbio-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-57-generic",
"binary_version": "6.8.0-57.59~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-57-generic-64k",
"binary_version": "6.8.0-57.59~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1072-ibm",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-headers-5.15.0-1072-ibm",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-ibm-cloud-tools-common",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-ibm-headers-5.15.0-1072",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-ibm-source-5.15.0",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-ibm-tools-5.15.0-1072",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-ibm-tools-common",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1072-ibm",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-modules-5.15.0-1072-ibm",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-modules-extra-5.15.0-1072-ibm",
"binary_version": "5.15.0-1072.75"
},
{
"binary_name": "linux-tools-5.15.0-1072-ibm",
"binary_version": "5.15.0-1072.75"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1023-ibm",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1023-ibm",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-ibm-6.8-headers-6.8.0-1023",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-ibm-6.8-tools-6.8.0-1023",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1023-ibm",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1023-ibm",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1023-ibm",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1023-ibm",
"binary_version": "6.8.0-1023.23~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1023-ibm",
"binary_version": "6.8.0-1023.23~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-common",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-common",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-host",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-headers-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1075",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-intel-iotg-cloud-tools-common",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-intel-iotg-headers-5.15.0-1075",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-intel-iotg-tools-5.15.0-1075",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-intel-iotg-tools-common",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-intel-iotg-tools-host",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-modules-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-modules-extra-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
},
{
"binary_name": "linux-tools-5.15.0-1075-intel-iotg",
"binary_version": "5.15.0-1075.81"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1076-kvm",
"binary_version": "5.15.0-1076.81"
},
{
"binary_name": "linux-headers-5.15.0-1076-kvm",
"binary_version": "5.15.0-1076.81"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1076-kvm",
"binary_version": "5.15.0-1076.81"
},
{
"binary_name": "linux-kvm-headers-5.15.0-1076",
"binary_version": "5.15.0-1076.81"
},
{
"binary_name": "linux-kvm-tools-5.15.0-1076",
"binary_version": "5.15.0-1076.81"
},
{
"binary_name": "linux-modules-5.15.0-1076-kvm",
"binary_version": "5.15.0-1076.81"
},
{
"binary_name": "linux-tools-5.15.0-1076-kvm",
"binary_version": "5.15.0-1076.81"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-cloud-tools-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-headers-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-headers-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-image-unsigned-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-lowlatency-cloud-tools-5.15.0-135",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-lowlatency-headers-5.15.0-135",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-lowlatency-tools-5.15.0-135",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-5.15.0-135-lowlatency",
"binary_version": "5.15.0-135.146"
},
{
"binary_name": "linux-tools-5.15.0-135-lowlatency-64k",
"binary_version": "5.15.0-135.146"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-headers-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-headers-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-common",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-headers-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-common",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-host",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-ipu6-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-ivsc-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-iwlwifi-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-tools-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-tools-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-common",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-host",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-common",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-host",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-54",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-54",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-54",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-buildinfo-5.15.0-1074-nvidia-lowlatency",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1074-nvidia-lowlatency",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-headers-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-headers-5.15.0-1074-nvidia-lowlatency",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-lowlatency",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-modules-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-modules-5.15.0-1074-nvidia-lowlatency",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-modules-extra-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia-lowlatency",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-nvidia-cloud-tools-5.15.0-1074",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-nvidia-cloud-tools-common",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-nvidia-headers-5.15.0-1074",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-nvidia-tools-5.15.0-1074",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-nvidia-tools-common",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-nvidia-tools-host",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-tools-5.15.0-1074-nvidia",
"binary_version": "5.15.0-1074.75"
},
{
"binary_name": "linux-tools-5.15.0-1074-nvidia-lowlatency",
"binary_version": "5.15.0-1074.75"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-headers-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-headers-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-extra-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-headers-6.2.0-1015",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-tools-6.2.0-1015",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-tools-host",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-tools-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-tools-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-headers-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-headers-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-extra-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-headers-6.5.0-1024",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-tools-host",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-tools-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-tools-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-headers-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-headers-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-modules-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-modules-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-modules-extra-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-nvidia-6.8-headers-6.8.0-1022",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-nvidia-6.8-tools-6.8.0-1022",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-tools-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25~22.04.2"
},
{
"binary_name": "linux-tools-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25~22.04.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra-rt",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-headers-5.15.0-1033-nvidia-tegra",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-headers-5.15.0-1033-nvidia-tegra-rt",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-rt",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-modules-5.15.0-1033-nvidia-tegra",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-modules-5.15.0-1033-nvidia-tegra-rt",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-modules-extra-5.15.0-1033-nvidia-tegra",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-nvidia-tegra-headers-5.15.0-1033",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-nvidia-tegra-tools-5.15.0-1033",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-tools-5.15.0-1033-nvidia-tegra",
"binary_version": "5.15.0-1033.33"
},
{
"binary_name": "linux-tools-5.15.0-1033-nvidia-tegra-rt",
"binary_version": "5.15.0-1033.33"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-modules-extra-5.15.0-1021-nvidia-tegra-igx",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1021",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1021",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx",
"binary_version": "5.15.0-1021.21"
},
{
"binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1021.21"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-headers-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-image-unsigned-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-ipu6-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-ivsc-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-iwlwifi-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-headers-5.17.0-1035",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-tools-5.17.0-1035",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-tools-host",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-tools-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-headers-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-image-unsigned-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-ipu6-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-ivsc-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-iwlwifi-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-headers-6.0.0-1021",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-tools-6.0.0-1021",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-tools-host",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-tools-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-headers-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-image-unsigned-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-ipu6-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-ivsc-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-iwlwifi-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-headers-6.1.0-1036",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-tools-6.1.0-1036",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-tools-host",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-tools-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-headers-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-ipu6-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-ivsc-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-usbio-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-headers-6.5.0-1027",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-lib-rust-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-tools-6.5.0-1027",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-tools-host",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-tools-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-headers-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-modules-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-modules-extra-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-oracle-headers-5.15.0-1077",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-oracle-tools-5.15.0-1077",
"binary_version": "5.15.0-1077.83"
},
{
"binary_name": "linux-tools-5.15.0-1077-oracle",
"binary_version": "5.15.0-1077.83"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-oracle-6.5-headers-6.5.0-1027",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-oracle-6.5-tools-6.5.0-1027",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-oracle-6.8-headers-6.8.0-1020",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-oracle-6.8-tools-6.8.0-1020",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1074-raspi",
"binary_version": "5.15.0-1074.77"
},
{
"binary_name": "linux-headers-5.15.0-1074-raspi",
"binary_version": "5.15.0-1074.77"
},
{
"binary_name": "linux-image-5.15.0-1074-raspi",
"binary_version": "5.15.0-1074.77"
},
{
"binary_name": "linux-modules-5.15.0-1074-raspi",
"binary_version": "5.15.0-1074.77"
},
{
"binary_name": "linux-modules-extra-5.15.0-1074-raspi",
"binary_version": "5.15.0-1074.77"
},
{
"binary_name": "linux-raspi-headers-5.15.0-1074",
"binary_version": "5.15.0-1074.77"
},
{
"binary_name": "linux-raspi-tools-5.15.0-1074",
"binary_version": "5.15.0-1074.77"
},
{
"binary_name": "linux-tools-5.15.0-1074-raspi",
"binary_version": "5.15.0-1074.77"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-headers-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-modules-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-modules-extra-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-cloud-tools-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-cloud-tools-common",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-headers-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-common",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-host",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-tools-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-headers-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-image-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-modules-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-modules-extra-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-riscv-headers-5.15.0-1028",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-riscv-tools-5.15.0-1028",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-tools-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-riscv-5.19-headers-5.19.0-1021",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-riscv-5.19-tools-5.19.0-1021",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1~22.04.1"
},
{
"binary_name": "linux-image-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.8-headers-6.8.0-53",
"binary_version": "6.8.0-53.55.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.8-tools-6.8.0-53",
"binary_version": "6.8.0-53.55.1~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-starfive-5.19-headers-5.19.0-1020",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-starfive-5.19-tools-5.19.0-1020",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-starfive-6.2-headers-6.2.0-1009",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-starfive-6.2-tools-6.2.0-1009",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-starfive-6.5-headers-6.5.0-1018",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-starfive-6.5-tools-6.5.0-1018",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1044-xilinx-zynqmp",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-headers-5.15.0-1044-xilinx-zynqmp",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-image-5.15.0-1044-xilinx-zynqmp",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-modules-5.15.0-1044-xilinx-zynqmp",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-tools-5.15.0-1044-xilinx-zynqmp",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1044",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1044",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-common",
"binary_version": "5.15.0-1044.48"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-host",
"binary_version": "5.15.0-1044.48"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available for NVIDIA BlueField platforms",
"binaries": [
{
"binary_name": "linux-bluefield-cloud-tools-common",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-bluefield-headers-5.15.0-1062",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-bluefield-tools-5.15.0-1062",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-bluefield-tools-host",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-buildinfo-5.15.0-1062-bluefield",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-headers-5.15.0-1062-bluefield",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1062-bluefield",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-modules-5.15.0-1062-bluefield",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-modules-extra-5.15.0-1062-bluefield",
"binary_version": "5.15.0-1062.64"
},
{
"binary_name": "linux-tools-5.15.0-1062-bluefield",
"binary_version": "5.15.0-1062.64"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-bpf-dev",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-buildinfo-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-buildinfo-6.8.0-54-generic-64k",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-cloud-tools-6.8.0-54",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-cloud-tools-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-headers-6.8.0-54",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-headers-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-headers-6.8.0-54-generic-64k",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-image-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-image-unsigned-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-image-unsigned-6.8.0-54-generic-64k",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-lib-rust-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-modules-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-modules-6.8.0-54-generic-64k",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-modules-extra-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-modules-ipu6-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-modules-usbio-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-source-6.8.0",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-tools-6.8.0-54",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-tools-6.8.0-54-generic",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-tools-6.8.0-54-generic-64k",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-tools-common",
"binary_version": "6.8.0-54.56"
},
{
"binary_name": "linux-tools-host",
"binary_version": "6.8.0-54.56"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-6.8.0-1023",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-aws-headers-6.8.0-1023",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-aws-tools-6.8.0-1023",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-buildinfo-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-headers-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-modules-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-modules-extra-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25"
},
{
"binary_name": "linux-tools-6.8.0-1023-aws",
"binary_version": "6.8.0-1023.25"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-6.8.0-1025",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-azure-headers-6.8.0-1025",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-azure-tools-6.8.0-1025",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-buildinfo-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-headers-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-modules-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-modules-extra-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-modules-involflt-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
},
{
"binary_name": "linux-tools-6.8.0-1025-azure",
"binary_version": "6.8.0-1025.30"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1012",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-azure-6.11-headers-6.11.0-1012",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-azure-6.11-tools-6.11.0-1012",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-cloud-tools-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1012-azure",
"binary_version": "6.11.0-1012.12~24.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1014",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-azure-nvidia-cloud-tools-common",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-azure-nvidia-headers-6.8.0-1014",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-azure-nvidia-tools-6.8.0-1014",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-buildinfo-6.8.0-1014-azure-nvidia",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1014-azure-nvidia",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-headers-6.8.0-1014-azure-nvidia",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-modules-6.8.0-1014-azure-nvidia",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-modules-extra-6.8.0-1014-azure-nvidia",
"binary_version": "6.8.0-1014.15"
},
{
"binary_name": "linux-tools-6.8.0-1014-azure-nvidia",
"binary_version": "6.8.0-1014.15"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-gcp-headers-6.8.0-1024",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-gcp-tools-6.8.0-1024",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-headers-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-headers-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-modules-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-modules-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-modules-extra-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-tools-6.8.0-1024-gcp",
"binary_version": "6.8.0-1024.26"
},
{
"binary_name": "linux-tools-6.8.0-1024-gcp-64k",
"binary_version": "6.8.0-1024.26"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-1011-gcp",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.11.0-1011-gcp-64k",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-gcp-6.11-headers-6.11.0-1011",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1011-gcp",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-gcp-6.11-tools-6.11.0-1011",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1011-gcp",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1011-gcp-64k",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1011-gcp",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1011-gcp",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1011-gcp-64k",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.11.0-1011-gcp",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.11.0-1011-gcp-64k",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1011-gcp",
"binary_version": "6.11.0-1011.11~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1011-gcp-64k",
"binary_version": "6.11.0-1011.11~24.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1019-gke",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-gke-headers-6.8.0-1019",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-gke-tools-6.8.0-1019",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-headers-6.8.0-1019-gke",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1019-gke",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-modules-6.8.0-1019-gke",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-modules-extra-6.8.0-1019-gke",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1019-gke",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-tools-6.8.0-1019-gke",
"binary_version": "6.8.0-1019.23"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1006-gkeop",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1006-gkeop",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-gkeop-cloud-tools-6.8.0-1006",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-gkeop-headers-6.8.0-1006",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-gkeop-tools-6.8.0-1006",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-headers-6.8.0-1006-gkeop",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1006-gkeop",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-modules-6.8.0-1006-gkeop",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-modules-extra-6.8.0-1006-gkeop",
"binary_version": "6.8.0-1006.8"
},
{
"binary_name": "linux-tools-6.8.0-1006-gkeop",
"binary_version": "6.8.0-1006.8"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1022-ibm",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-headers-6.8.0-1022-ibm",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-ibm-headers-6.8.0-1022",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-ibm-tools-6.8.0-1022",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1022-ibm",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-modules-6.8.0-1022-ibm",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-modules-extra-6.8.0-1022-ibm",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1022-ibm",
"binary_version": "6.8.0-1022.22"
},
{
"binary_name": "linux-tools-6.8.0-1022-ibm",
"binary_version": "6.8.0-1022.22"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-headers-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-headers-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-lowlatency-cloud-tools-6.8.0-54",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-lowlatency-headers-6.8.0-54",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-lowlatency-lib-rust-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-lowlatency-tools-6.8.0-54",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-modules-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-modules-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-tools-6.8.0-54-lowlatency",
"binary_version": "6.8.0-54.56.1"
},
{
"binary_name": "linux-tools-6.8.0-54-lowlatency-64k",
"binary_version": "6.8.0-54.56.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-headers-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-headers-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-modules-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-modules-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-modules-extra-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-nvidia-headers-6.8.0-1022",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-nvidia-tools-6.8.0-1022",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-tools-6.8.0-1022-nvidia",
"binary_version": "6.8.0-1022.25"
},
{
"binary_name": "linux-tools-6.8.0-1022-nvidia-64k",
"binary_version": "6.8.0-1022.25"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-buildinfo-6.11.0-1007-nvidia-64k",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-headers-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-headers-6.11.0-1007-nvidia-64k",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-64k",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-modules-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-modules-6.11.0-1007-nvidia-64k",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-modules-extra-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-modules-extra-6.11.0-1007-nvidia-64k",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia-64k",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-nvidia-6.11-headers-6.11.0-1007",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-nvidia-6.11-lib-rust-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-nvidia-6.11-tools-6.11.0-1007",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-tools-6.11.0-1007-nvidia",
"binary_version": "6.11.0-1007.7"
},
{
"binary_name": "linux-tools-6.11.0-1007-nvidia-64k",
"binary_version": "6.11.0-1007.7"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-modules-extra-6.8.0-1022-nvidia-lowlatency",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1022",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1022",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency",
"binary_version": "6.8.0-1022.25.2"
},
{
"binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1022.25.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-headers-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-modules-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-modules-ipu6-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-modules-ipu7-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-modules-iwlwifi-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-modules-usbio-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-modules-vision-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-oem-6.11-headers-6.11.0-1015",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-oem-6.11-tools-6.11.0-1015",
"binary_version": "6.11.0-1015.15"
},
{
"binary_name": "linux-tools-6.11.0-1015-oem",
"binary_version": "6.11.0-1015.15"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-headers-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-modules-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-modules-ipu6-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-modules-usbio-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-oem-6.8-headers-6.8.0-1024",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-oem-6.8-tools-6.8.0-1024",
"binary_version": "6.8.0-1024.24"
},
{
"binary_name": "linux-tools-6.8.0-1024-oem",
"binary_version": "6.8.0-1024.24"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-headers-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-headers-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-modules-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-modules-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-modules-extra-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-oracle-headers-6.8.0-1020",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-oracle-tools-6.8.0-1020",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-tools-6.8.0-1020-oracle",
"binary_version": "6.8.0-1020.21"
},
{
"binary_name": "linux-tools-6.8.0-1020-oracle-64k",
"binary_version": "6.8.0-1020.21"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1019-raspi",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-headers-6.8.0-1019-raspi",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-image-6.8.0-1019-raspi",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-modules-6.8.0-1019-raspi",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-raspi-headers-6.8.0-1019",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-raspi-tools-6.8.0-1019",
"binary_version": "6.8.0-1019.23"
},
{
"binary_name": "linux-tools-6.8.0-1019-raspi",
"binary_version": "6.8.0-1019.23"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-cloud-tools-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-headers-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-image-unsigned-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-modules-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-modules-extra-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-realtime-cloud-tools-6.8.1-1015",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-realtime-headers-6.8.1-1015",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-realtime-tools-6.8.1-1015",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-tools-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1"
},
{
"binary_name": "linux-headers-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1"
},
{
"binary_name": "linux-image-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1"
},
{
"binary_name": "linux-modules-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1"
},
{
"binary_name": "linux-riscv-headers-6.8.0-53",
"binary_version": "6.8.0-53.55.1"
},
{
"binary_name": "linux-riscv-tools-6.8.0-53",
"binary_version": "6.8.0-53.55.1"
},
{
"binary_name": "linux-tools-6.8.0-53-generic",
"binary_version": "6.8.0-53.55.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1017-xilinx",
"binary_version": "6.8.0-1017.18"
},
{
"binary_name": "linux-headers-6.8.0-1017-xilinx",
"binary_version": "6.8.0-1017.18"
},
{
"binary_name": "linux-image-6.8.0-1017-xilinx",
"binary_version": "6.8.0-1017.18"
},
{
"binary_name": "linux-modules-6.8.0-1017-xilinx",
"binary_version": "6.8.0-1017.18"
},
{
"binary_name": "linux-tools-6.8.0-1017-xilinx",
"binary_version": "6.8.0-1017.18"
},
{
"binary_name": "linux-xilinx-headers-6.8.0-1017",
"binary_version": "6.8.0-1017.18"
},
{
"binary_name": "linux-xilinx-tools-6.8.0-1017",
"binary_version": "6.8.0-1017.18"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-fde-cloud-tools-6.14.0-1014",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-azure-fde-headers-6.14.0-1014",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-azure-fde-tools-6.14.0-1014",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-buildinfo-6.14.0-1014-azure-fde",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-cloud-tools-6.14.0-1014-azure-fde",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-headers-6.14.0-1014-azure-fde",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1014-azure-fde",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-modules-6.14.0-1014-azure-fde",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-modules-extra-6.14.0-1014-azure-fde",
"binary_version": "6.14.0-1014.14"
},
{
"binary_name": "linux-tools-6.14.0-1014-azure-fde",
"binary_version": "6.14.0-1014.14"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "crypto-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "fat-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "fb-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "firewire-core-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "floppy-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "fs-core-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "fs-secondary-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "input-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "ipmi-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "irda-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "kernel-image-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-buildinfo-3.13.0-207-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-buildinfo-3.13.0-207-lowlatency",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-cloud-tools-3.13.0-207",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-cloud-tools-3.13.0-207-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-cloud-tools-3.13.0-207-lowlatency",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-headers-3.13.0-207",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-headers-3.13.0-207-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-headers-3.13.0-207-lowlatency",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-image-unsigned-3.13.0-207-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-image-unsigned-3.13.0-207-lowlatency",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-modules-3.13.0-207-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-modules-3.13.0-207-lowlatency",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-modules-extra-3.13.0-207-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-source-3.13.0",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-tools-3.13.0-207",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-tools-3.13.0-207-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-tools-3.13.0-207-lowlatency",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-tools-common",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "md-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "message-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "mouse-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "multipath-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "nfs-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "nic-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "nic-pcmcia-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "nic-shared-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "nic-usb-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "parport-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "pata-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "pcmcia-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "pcmcia-storage-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "plip-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "ppp-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "sata-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "scsi-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "serial-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "speakup-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "squashfs-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "storage-core-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "usb-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "virtio-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
},
{
"binary_name": "vlan-modules-3.13.0-207-generic-di",
"binary_version": "3.13.0-207.258"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.4.0-1146",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-aws-headers-4.4.0-1146",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-aws-tools-4.4.0-1146",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-buildinfo-4.4.0-1146-aws",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1146-aws",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-headers-4.4.0-1146-aws",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-image-4.4.0-1146-aws",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-modules-4.4.0-1146-aws",
"binary_version": "4.4.0-1146.152"
},
{
"binary_name": "linux-tools-4.4.0-1146-aws",
"binary_version": "4.4.0-1146.152"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-4.15.0-1191",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-azure-headers-4.15.0-1191",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-azure-tools-4.15.0-1191",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~14.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~14.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "block-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "crypto-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "fat-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "fb-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "firewire-core-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "floppy-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "fs-core-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "fs-secondary-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "input-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "ipmi-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "irda-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "kernel-image-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-271",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-image-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-lts-xenial-cloud-tools-4.4.0-271",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-lts-xenial-tools-4.4.0-271",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-lts-xenial-udebs-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-modules-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-modules-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-modules-extra-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-tools-4.4.0-271-generic",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "linux-tools-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "md-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "message-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "mouse-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "multipath-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "nfs-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "nic-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "nic-shared-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "nic-usb-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "parport-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "pata-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "pcmcia-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "plip-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "ppp-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "sata-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "scsi-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "serial-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "speakup-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "storage-core-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "usb-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "virtio-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
},
{
"binary_name": "vlan-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305~14.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "block-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "crypto-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "dasd-extra-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "dasd-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "fat-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "fb-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "firewire-core-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "floppy-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "fs-core-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "fs-secondary-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "input-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "ipmi-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "irda-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "kernel-image-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-buildinfo-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-buildinfo-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-cloud-tools-4.4.0-271",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-cloud-tools-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-cloud-tools-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-headers-4.4.0-271",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-headers-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-headers-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-image-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-image-unsigned-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-image-unsigned-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-modules-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-modules-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-modules-extra-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-source-4.4.0",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-tools-4.4.0-271",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-tools-4.4.0-271-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-tools-4.4.0-271-lowlatency",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "md-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "message-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "mouse-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "multipath-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "nfs-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "nic-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "nic-shared-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "nic-usb-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "parport-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "pata-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "pcmcia-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "plip-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "ppp-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "sata-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "scsi-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "serial-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "speakup-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "storage-core-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "usb-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "virtio-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
},
{
"binary_name": "vlan-modules-4.4.0-271-generic-di",
"binary_version": "4.4.0-271.305"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.4.0-1184",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-aws-headers-4.4.0-1184",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-aws-tools-4.4.0-1184",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-buildinfo-4.4.0-1184-aws",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1184-aws",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-headers-4.4.0-1184-aws",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-image-4.4.0-1184-aws",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-modules-4.4.0-1184-aws",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-modules-extra-4.4.0-1184-aws",
"binary_version": "4.4.0-1184.199"
},
{
"binary_name": "linux-tools-4.4.0-1184-aws",
"binary_version": "4.4.0-1184.199"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-headers-4.15.0-1183",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1183",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-aws-hwe-tools-4.15.0-1183",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196~16.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-4.15.0-1191",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-azure-headers-4.15.0-1191",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-azure-tools-4.15.0-1191",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206~16.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193~16.04.1"
},
{
"binary_name": "linux-gcp-headers-4.15.0-1176",
"binary_version": "4.15.0-1176.193~16.04.1"
},
{
"binary_name": "linux-gcp-tools-4.15.0-1176",
"binary_version": "4.15.0-1176.193~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193~16.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "block-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "dasd-extra-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "dasd-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "fb-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "firewire-core-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "floppy-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-240",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-hwe-cloud-tools-4.15.0-240",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-hwe-tools-4.15.0-240",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-hwe-udebs-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-240-generic",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "message-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "pata-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "pcmcia-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "serial-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "virtio-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252~16.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.4.0-1147-kvm",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1147-kvm",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-headers-4.4.0-1147-kvm",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-image-4.4.0-1147-kvm",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-kvm-cloud-tools-4.4.0-1147",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-kvm-headers-4.4.0-1147",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-kvm-tools-4.4.0-1147",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-modules-4.4.0-1147-kvm",
"binary_version": "4.4.0-1147.158"
},
{
"binary_name": "linux-tools-4.4.0-1147-kvm",
"binary_version": "4.4.0-1147.158"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156~16.04.1"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1145",
"binary_version": "4.15.0-1145.156~16.04.1"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1145",
"binary_version": "4.15.0-1145.156~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156~16.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "block-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "crypto-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "dasd-extra-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "dasd-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "fat-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "fb-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "firewire-core-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "floppy-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "fs-core-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "fs-secondary-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "input-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "ipmi-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "irda-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "kernel-image-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-buildinfo-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-buildinfo-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-cloud-tools-4.15.0-240",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-cloud-tools-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-cloud-tools-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-headers-4.15.0-240",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-headers-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-headers-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-image-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-image-unsigned-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-image-unsigned-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-modules-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-modules-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-modules-extra-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-tools-4.15.0-240",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-tools-4.15.0-240-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-tools-4.15.0-240-lowlatency",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "md-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "message-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "mouse-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "multipath-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "nfs-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "nic-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "nic-shared-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "nic-usb-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "parport-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "pata-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "pcmcia-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "plip-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "ppp-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "sata-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "scsi-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "serial-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "storage-core-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "usb-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "virtio-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
},
{
"binary_name": "vlan-modules-4.15.0-240-generic-di",
"binary_version": "4.15.0-240.252"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.15.0-1183",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-aws-headers-4.15.0-1183",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-aws-tools-4.15.0-1183",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-buildinfo-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-headers-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-modules-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-modules-extra-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196"
},
{
"binary_name": "linux-tools-4.15.0-1183-aws",
"binary_version": "4.15.0-1183.196"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1149",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-aws-5.4-headers-5.4.0-1149",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-aws-5.4-tools-5.4.0-1149",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1191",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-azure-4.15-headers-4.15.0-1191",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-azure-4.15-tools-4.15.0-1191",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-buildinfo-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-headers-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-modules-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-modules-extra-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206"
},
{
"binary_name": "linux-tools-4.15.0-1191-azure",
"binary_version": "4.15.0-1191.206"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-azure-5.4-headers-5.4.0-1154",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-azure-5.4-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193"
},
{
"binary_name": "linux-gcp-4.15-headers-4.15.0-1176",
"binary_version": "4.15.0-1176.193"
},
{
"binary_name": "linux-gcp-4.15-tools-4.15.0-1176",
"binary_version": "4.15.0-1176.193"
},
{
"binary_name": "linux-headers-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193"
},
{
"binary_name": "linux-modules-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193"
},
{
"binary_name": "linux-modules-extra-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193"
},
{
"binary_name": "linux-tools-4.15.0-1176-gcp",
"binary_version": "4.15.0-1176.193"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-headers-5.4.0-1152",
"binary_version": "5.4.0-1152.161~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-tools-5.4.0-1152",
"binary_version": "5.4.0-1152.161~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "block-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "crypto-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "dasd-extra-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "dasd-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "fat-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "fb-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "firewire-core-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "floppy-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "fs-core-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "fs-secondary-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "input-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "ipmi-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "kernel-image-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-220-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-220-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-220-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-220",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-cloud-tools-common",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-headers-5.4.0-220",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-source-5.4.0",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-tools-5.4.0-220",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-tools-common",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-udebs-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-220-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-220-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-220-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-220-generic",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "md-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "message-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "mouse-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "multipath-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "nfs-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "nic-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "nic-shared-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "nic-usb-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "parport-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "pata-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "pcmcia-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "plip-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "ppp-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "sata-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "scsi-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "serial-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "storage-core-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "usb-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "virtio-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
},
{
"binary_name": "vlan-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-cloud-tools-common",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-headers-5.4.0-1095",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-source-5.4.0",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-5.4.0-1095",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-common",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1166-kvm",
"binary_version": "4.15.0-1166.171"
},
{
"binary_name": "linux-headers-4.15.0-1166-kvm",
"binary_version": "4.15.0-1166.171"
},
{
"binary_name": "linux-image-4.15.0-1166-kvm",
"binary_version": "4.15.0-1166.171"
},
{
"binary_name": "linux-kvm-headers-4.15.0-1166",
"binary_version": "4.15.0-1166.171"
},
{
"binary_name": "linux-kvm-tools-4.15.0-1166",
"binary_version": "4.15.0-1166.171"
},
{
"binary_name": "linux-modules-4.15.0-1166-kvm",
"binary_version": "4.15.0-1166.171"
},
{
"binary_name": "linux-tools-4.15.0-1166-kvm",
"binary_version": "4.15.0-1166.171"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156"
},
{
"binary_name": "linux-headers-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156"
},
{
"binary_name": "linux-modules-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156"
},
{
"binary_name": "linux-modules-extra-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1145",
"binary_version": "4.15.0-1145.156"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1145",
"binary_version": "4.15.0-1145.156"
},
{
"binary_name": "linux-tools-4.15.0-1145-oracle",
"binary_version": "4.15.0-1145.156"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1148-oracle",
"binary_version": "5.4.0-1148.158~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1148-oracle",
"binary_version": "5.4.0-1148.158~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1148-oracle",
"binary_version": "5.4.0-1148.158~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1148-oracle",
"binary_version": "5.4.0-1148.158~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1148-oracle",
"binary_version": "5.4.0-1148.158~18.04.1"
},
{
"binary_name": "linux-oracle-5.4-headers-5.4.0-1148",
"binary_version": "5.4.0-1148.158~18.04.1"
},
{
"binary_name": "linux-oracle-5.4-tools-5.4.0-1148",
"binary_version": "5.4.0-1148.158~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1148-oracle",
"binary_version": "5.4.0-1148.158~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145~18.04.1"
},
{
"binary_name": "linux-image-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-headers-5.4.0-1132",
"binary_version": "5.4.0-1132.145~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-tools-5.4.0-1132",
"binary_version": "5.4.0-1132.145~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145~18.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "block-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "block-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "crypto-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "crypto-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "dasd-extra-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "dasd-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "fat-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "fat-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "fb-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "firewire-core-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "floppy-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "fs-core-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "fs-core-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "fs-secondary-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "fs-secondary-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "input-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "input-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "ipmi-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "ipmi-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "kernel-image-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "kernel-image-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-buildinfo-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-buildinfo-5.4.0-220-generic-lpae",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-buildinfo-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-cloud-tools-5.4.0-220",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-cloud-tools-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-cloud-tools-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-headers-5.4.0-220",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-headers-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-headers-5.4.0-220-generic-lpae",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-headers-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-image-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-image-5.4.0-220-generic-lpae",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-image-unsigned-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-image-unsigned-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-modules-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-modules-5.4.0-220-generic-lpae",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-modules-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-modules-extra-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-source-5.4.0",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-tools-5.4.0-220",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-tools-5.4.0-220-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-tools-5.4.0-220-generic-lpae",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-tools-5.4.0-220-lowlatency",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-tools-common",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-tools-host",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "linux-udebs-generic-lpae",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "md-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "md-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "message-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "mouse-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "mouse-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "multipath-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "multipath-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nfs-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nfs-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nic-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nic-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nic-pcmcia-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nic-shared-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nic-shared-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nic-usb-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "nic-usb-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "parport-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "parport-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "pata-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "pcmcia-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "pcmcia-storage-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "plip-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "plip-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "ppp-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "ppp-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "sata-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "sata-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "scsi-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "scsi-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "serial-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "storage-core-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "storage-core-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "usb-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "usb-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "virtio-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "vlan-modules-5.4.0-220-generic-di",
"binary_version": "5.4.0-220.240"
},
{
"binary_name": "vlan-modules-5.4.0-220-generic-lpae-di",
"binary_version": "5.4.0-220.240"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-5.4.0-1149",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-aws-headers-5.4.0-1149",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-aws-tools-5.4.0-1149",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-buildinfo-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-headers-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-modules-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-modules-extra-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159"
},
{
"binary_name": "linux-tools-5.4.0-1149-aws",
"binary_version": "5.4.0-1149.159"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-azure-headers-5.4.0-1154",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-azure-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-buildinfo-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-headers-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-modules-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-modules-extra-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161"
},
{
"binary_name": "linux-tools-5.4.0-1154-azure",
"binary_version": "5.4.0-1154.161"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-bluefield-headers-5.4.0-1108",
"binary_version": "5.4.0-1108.115"
},
{
"binary_name": "linux-bluefield-tools-5.4.0-1108",
"binary_version": "5.4.0-1108.115"
},
{
"binary_name": "linux-buildinfo-5.4.0-1108-bluefield",
"binary_version": "5.4.0-1108.115"
},
{
"binary_name": "linux-headers-5.4.0-1108-bluefield",
"binary_version": "5.4.0-1108.115"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1108-bluefield",
"binary_version": "5.4.0-1108.115"
},
{
"binary_name": "linux-modules-5.4.0-1108-bluefield",
"binary_version": "5.4.0-1108.115"
},
{
"binary_name": "linux-tools-5.4.0-1108-bluefield",
"binary_version": "5.4.0-1108.115"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161"
},
{
"binary_name": "linux-gcp-headers-5.4.0-1152",
"binary_version": "5.4.0-1152.161"
},
{
"binary_name": "linux-gcp-tools-5.4.0-1152",
"binary_version": "5.4.0-1152.161"
},
{
"binary_name": "linux-headers-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161"
},
{
"binary_name": "linux-modules-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161"
},
{
"binary_name": "linux-modules-extra-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161"
},
{
"binary_name": "linux-tools-5.4.0-1152-gcp",
"binary_version": "5.4.0-1152.161"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-headers-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-ibm-cloud-tools-common",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-ibm-headers-5.4.0-1095",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-ibm-source-5.4.0",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-ibm-tools-5.4.0-1095",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-ibm-tools-common",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-modules-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-modules-extra-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100"
},
{
"binary_name": "linux-tools-5.4.0-1095-ibm",
"binary_version": "5.4.0-1095.100"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1053-iot",
"binary_version": "5.4.0-1053.56"
},
{
"binary_name": "linux-headers-5.4.0-1053-iot",
"binary_version": "5.4.0-1053.56"
},
{
"binary_name": "linux-image-5.4.0-1053-iot",
"binary_version": "5.4.0-1053.56"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1053-iot",
"binary_version": "5.4.0-1053.56"
},
{
"binary_name": "linux-iot-headers-5.4.0-1053",
"binary_version": "5.4.0-1053.56"
},
{
"binary_name": "linux-iot-tools-5.4.0-1053",
"binary_version": "5.4.0-1053.56"
},
{
"binary_name": "linux-modules-5.4.0-1053-iot",
"binary_version": "5.4.0-1053.56"
},
{
"binary_name": "linux-tools-5.4.0-1053-iot",
"binary_version": "5.4.0-1053.56"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1136-kvm",
"binary_version": "5.4.0-1136.145"
},
{
"binary_name": "linux-headers-5.4.0-1136-kvm",
"binary_version": "5.4.0-1136.145"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1136-kvm",
"binary_version": "5.4.0-1136.145"
},
{
"binary_name": "linux-kvm-headers-5.4.0-1136",
"binary_version": "5.4.0-1136.145"
},
{
"binary_name": "linux-kvm-tools-5.4.0-1136",
"binary_version": "5.4.0-1136.145"
},
{
"binary_name": "linux-modules-5.4.0-1136-kvm",
"binary_version": "5.4.0-1136.145"
},
{
"binary_name": "linux-tools-5.4.0-1136-kvm",
"binary_version": "5.4.0-1136.145"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra-rt",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1039-nvidia-tegra",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1039-nvidia-tegra-rt",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1039-nvidia-tegra",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1039-nvidia-tegra-rt",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1039-nvidia-tegra",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1039",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1039",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1039-nvidia-tegra",
"binary_version": "5.15.0-1039.39~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1039-nvidia-tegra-rt",
"binary_version": "5.15.0-1039.39~20.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1147-oracle",
"binary_version": "5.4.0-1147.157"
},
{
"binary_name": "linux-headers-5.4.0-1147-oracle",
"binary_version": "5.4.0-1147.157"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1147-oracle",
"binary_version": "5.4.0-1147.157"
},
{
"binary_name": "linux-modules-5.4.0-1147-oracle",
"binary_version": "5.4.0-1147.157"
},
{
"binary_name": "linux-modules-extra-5.4.0-1147-oracle",
"binary_version": "5.4.0-1147.157"
},
{
"binary_name": "linux-oracle-headers-5.4.0-1147",
"binary_version": "5.4.0-1147.157"
},
{
"binary_name": "linux-oracle-tools-5.4.0-1147",
"binary_version": "5.4.0-1147.157"
},
{
"binary_name": "linux-tools-5.4.0-1147-oracle",
"binary_version": "5.4.0-1147.157"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145"
},
{
"binary_name": "linux-headers-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145"
},
{
"binary_name": "linux-image-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145"
},
{
"binary_name": "linux-modules-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145"
},
{
"binary_name": "linux-raspi-headers-5.4.0-1132",
"binary_version": "5.4.0-1132.145"
},
{
"binary_name": "linux-raspi-tools-5.4.0-1132",
"binary_version": "5.4.0-1132.145"
},
{
"binary_name": "linux-tools-5.4.0-1132-raspi",
"binary_version": "5.4.0-1132.145"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1067-xilinx-zynqmp",
"binary_version": "5.4.0-1067.71"
},
{
"binary_name": "linux-headers-5.4.0-1067-xilinx-zynqmp",
"binary_version": "5.4.0-1067.71"
},
{
"binary_name": "linux-image-5.4.0-1067-xilinx-zynqmp",
"binary_version": "5.4.0-1067.71"
},
{
"binary_name": "linux-modules-5.4.0-1067-xilinx-zynqmp",
"binary_version": "5.4.0-1067.71"
},
{
"binary_name": "linux-tools-5.4.0-1067-xilinx-zynqmp",
"binary_version": "5.4.0-1067.71"
},
{
"binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1067",
"binary_version": "5.4.0-1067.71"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1067",
"binary_version": "5.4.0-1067.71"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-headers-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-modules-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-modules-extra-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-realtime-cloud-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-realtime-cloud-tools-common",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-realtime-headers-5.15.0-1080",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-realtime-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-realtime-tools-common",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-realtime-tools-host",
"binary_version": "5.15.0-1080.88"
},
{
"binary_name": "linux-tools-5.15.0-1080-realtime",
"binary_version": "5.15.0-1080.88"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-headers-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-modules-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-realtime-6.8-cloud-tools-6.8.1-1016",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-realtime-6.8-headers-6.8.1-1016",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-realtime-6.8-tools-6.8.1-1016",
"binary_version": "6.8.1-1016.17~22.04.1"
},
{
"binary_name": "linux-tools-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17~22.04.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-2018-raspi-realtime",
"binary_version": "6.8.0-2018.19"
},
{
"binary_name": "linux-headers-6.8.0-2018-raspi-realtime",
"binary_version": "6.8.0-2018.19"
},
{
"binary_name": "linux-image-6.8.0-2018-raspi-realtime",
"binary_version": "6.8.0-2018.19"
},
{
"binary_name": "linux-modules-6.8.0-2018-raspi-realtime",
"binary_version": "6.8.0-2018.19"
},
{
"binary_name": "linux-raspi-realtime-headers-6.8.0-2018",
"binary_version": "6.8.0-2018.19"
},
{
"binary_name": "linux-raspi-realtime-tools-6.8.0-2018",
"binary_version": "6.8.0-2018.19"
},
{
"binary_name": "linux-tools-6.8.0-2018-raspi-realtime",
"binary_version": "6.8.0-2018.19"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-cloud-tools-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-headers-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-image-unsigned-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-modules-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-modules-extra-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-realtime-cloud-tools-6.8.1-1016",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-realtime-headers-6.8.1-1016",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-realtime-tools-6.8.1-1016",
"binary_version": "6.8.1-1016.17"
},
{
"binary_name": "linux-tools-6.8.1-1016-realtime",
"binary_version": "6.8.1-1016.17"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-fips-cloud-tools-5.15.0-1051",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-aws-fips-headers-5.15.0-1051",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-aws-fips-tools-5.15.0-1051",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.15.0-1053",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.15.0-1053",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.15.0-1053",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-fips-headers-5.15.0-73",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-fips-tools-5.15.0-73",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-headers-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-modules-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-tools-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.15.0-1048",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.15.0-1048",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-4.15.0-2121",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-aws-fips-tools-4.15.0-2121",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-buildinfo-4.15.0-2121-aws-fips",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-headers-4.15.0-2121-aws-fips",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2121-aws-fips",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2121-aws-fips",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-modules-4.15.0-2121-aws-fips",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-modules-extra-4.15.0-2121-aws-fips",
"binary_version": "4.15.0-2121.127"
},
{
"binary_name": "linux-tools-4.15.0-2121-aws-fips",
"binary_version": "4.15.0-2121.127"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-2100",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-azure-fips-headers-4.15.0-2100",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-azure-fips-tools-4.15.0-2100",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-buildinfo-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-cloud-tools-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-headers-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-modules-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-modules-extra-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
},
{
"binary_name": "linux-tools-4.15.0-2100-azure-fips",
"binary_version": "4.15.0-2100.106"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-fips-headers-4.15.0-1138",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-fips-tools-4.15.0-1138",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-headers-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-image-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-image-hmac-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-modules-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-modules-extra-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
},
{
"binary_name": "linux-tools-4.15.0-1138-fips",
"binary_version": "4.15.0-1138.149"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-2084-gcp-fips",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-gcp-fips-headers-4.15.0-2084",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-gcp-fips-tools-4.15.0-2084",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-headers-4.15.0-2084-gcp-fips",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2084-gcp-fips",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2084-gcp-fips",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-modules-4.15.0-2084-gcp-fips",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-modules-extra-4.15.0-2084-gcp-fips",
"binary_version": "4.15.0-2084.90"
},
{
"binary_name": "linux-tools-4.15.0-2084-gcp-fips",
"binary_version": "4.15.0-2084.90"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-5.4.0-1149",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-aws-fips-tools-5.4.0-1149",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1149-aws-fips",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1149-aws-fips",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1149-aws-fips",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1149-aws-fips",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1149-aws-fips",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1149-aws-fips",
"binary_version": "5.4.0-1149.159+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1149-aws-fips",
"binary_version": "5.4.0-1149.159+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1155",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.4.0-1155",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.4.0-1155",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1155-azure-fips",
"binary_version": "5.4.0-1155.162+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1123-fips",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-fips-headers-5.4.0-1123",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-fips-tools-5.4.0-1123",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-headers-5.4.0-1123-fips",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1123-fips",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1123-fips",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-modules-5.4.0-1123-fips",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-modules-extra-5.4.0-1123-fips",
"binary_version": "5.4.0-1123.133"
},
{
"binary_name": "linux-tools-5.4.0-1123-fips",
"binary_version": "5.4.0-1123.133"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1152-gcp-fips",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.4.0-1152",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.4.0-1152",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1152-gcp-fips",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1152-gcp-fips",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1152-gcp-fips",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1152-gcp-fips",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1152-gcp-fips",
"binary_version": "5.4.0-1152.161+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1152-gcp-fips",
"binary_version": "5.4.0-1152.161+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-aws-fips-cloud-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-aws-fips-headers-5.15.0-1080",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-aws-fips-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1080-aws-fips",
"binary_version": "5.15.0-1080.87+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.15.0-1083",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-modules-involflt-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1083-azure-fips",
"binary_version": "5.15.0-1083.92+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-fips-headers-5.15.0-135",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-fips-tools-5.15.0-135",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-headers-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-modules-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
},
{
"binary_name": "linux-tools-5.15.0-135-fips",
"binary_version": "5.15.0-135.146+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1079-gcp-fips",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.15.0-1079",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.15.0-1079",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1079-gcp-fips",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1079-gcp-fips",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1079-gcp-fips",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1079-gcp-fips",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1079-gcp-fips",
"binary_version": "5.15.0-1079.88+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1079-gcp-fips",
"binary_version": "5.15.0-1079.88+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "block-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "crypto-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "dasd-extra-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "dasd-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "fat-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "fb-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "firewire-core-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "floppy-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "fs-core-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "fs-secondary-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "input-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "ipmi-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "irda-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "kernel-image-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-buildinfo-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-fips-cloud-tools-common",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-fips-headers-4.4.0-1116",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-fips-source-4.4.0",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-fips-tools-4.4.0-1116",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-headers-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-image-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-image-hmac-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-image-unsigned-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-image-unsigned-hmac-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-modules-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-modules-extra-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-tools-4.4.0-1116-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "linux-udebs-fips",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "md-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "message-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "mouse-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "multipath-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "nfs-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "nic-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "nic-shared-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "nic-usb-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "parport-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "pata-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "pcmcia-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "plip-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "ppp-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "sata-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "scsi-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "serial-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "speakup-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "storage-core-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "usb-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "virtio-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
},
{
"binary_name": "vlan-modules-4.4.0-1116-fips-di",
"binary_version": "4.4.0-1116.123"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "block-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "crypto-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "dasd-extra-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "dasd-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fat-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "firewire-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "floppy-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fs-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fs-secondary-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "input-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "ipmi-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "irda-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "kernel-image-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-headers-4.4.0-1002",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-source-4.4.0",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-tools-4.4.0-1002",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-headers-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-extra-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-hmac-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-tools-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-udebs-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "md-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "message-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "mouse-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "multipath-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nfs-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-shared-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-usb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "parport-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pata-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pcmcia-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "plip-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "ppp-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "sata-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "scsi-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "serial-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "speakup-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "storage-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "usb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "virtio-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "vlan-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-4.15.0-2000",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-aws-fips-tools-4.15.0-2000",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-buildinfo-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-headers-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-modules-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-modules-extra-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-tools-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-azure-fips-headers-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-azure-fips-tools-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-buildinfo-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-headers-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-modules-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-modules-extra-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-tools-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-headers-4.15.0-1011",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-tools-4.15.0-1011",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-headers-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-hmac-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-modules-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-modules-extra-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-tools-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-gcp-fips-headers-4.15.0-1001",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-gcp-fips-tools-4.15.0-1001",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-headers-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-modules-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-tools-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-aws-fips-tools-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-buildinfo-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-headers-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-modules-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-modules-extra-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-tools-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-headers-5.4.0-1007",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-tools-5.4.0-1007",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-headers-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-modules-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-modules-extra-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-tools-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
}
]
}{
"priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
}
]
}