In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2capconnect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hcirxwork Call Trace: <TASK> _dumpstack lib/dumpstack.c:93 [inline] dumpstacklvl+0x116/0x1f0 lib/dumpstack.c:119 printaddressdescription mm/kasan/report.c:377 [inline] printreport+0xc3/0x620 mm/kasan/report.c:488 kasanreport+0xd9/0x110 mm/kasan/report.c:601 l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 l2capconnectreq net/bluetooth/l2capcore.c:4080 [inline] l2capbredrsigcmd net/bluetooth/l2capcore.c:4772 [inline] l2capsigchannel net/bluetooth/l2capcore.c:5543 [inline] l2caprecvframe+0xf0b/0x8eb0 net/bluetooth/l2capcore.c:6825 l2caprecvacldata+0x9b4/0xb70 net/bluetooth/l2capcore.c:7514 hciacldatapacket net/bluetooth/hcicore.c:3791 [inline] hcirxwork+0xaab/0x1610 net/bluetooth/hcicore.c:4028 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244 ... Freed by task 5245: kasansavestack+0x33/0x60 mm/kasan/common.c:47 kasansavetrack+0x14/0x30 mm/kasan/common.c:68 kasansavefreeinfo+0x3b/0x60 mm/kasan/generic.c:579 poisonslabobject+0xf7/0x160 mm/kasan/common.c:240 _kasanslabfree+0x32/0x50 mm/kasan/common.c:256 kasanslabfree include/linux/kasan.h:184 [inline] slabfreehook mm/slub.c:2256 [inline] slabfree mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2capconnfree net/bluetooth/l2capcore.c:1810 [inline] krefput include/linux/kref.h:65 [inline] l2capconnput net/bluetooth/l2capcore.c:1822 [inline] l2capconndel+0x59d/0x730 net/bluetooth/l2capcore.c:1802 l2capconnectcfm+0x9e6/0xf80 net/bluetooth/l2capcore.c:7241 hciconnectcfm include/net/bluetooth/hcicore.h:1960 [inline] hciconnfailed+0x1c3/0x370 net/bluetooth/hciconn.c:1265 hciabortconnsync+0x75a/0xb50 net/bluetooth/hcisync.c:5583 abortconnsync+0x197/0x360 net/bluetooth/hciconn.c:2917 hcicmdsyncwork+0x1a4/0x410 net/bluetooth/hcisync.c:328 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.4.0-1146.152", "binary_name": "linux-aws-cloud-tools-4.4.0-1146" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-aws-headers-4.4.0-1146" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-aws-tools-4.4.0-1146" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-buildinfo-4.4.0-1146-aws" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-cloud-tools-4.4.0-1146-aws" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-headers-4.4.0-1146-aws" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-image-4.4.0-1146-aws" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-image-4.4.0-1146-aws-dbgsym" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-modules-4.4.0-1146-aws" }, { "binary_version": "4.4.0-1146.152", "binary_name": "linux-tools-4.4.0-1146-aws" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-azure-headers-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-azure-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-buildinfo-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-cloud-tools-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-headers-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-modules-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-modules-extra-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-tools-4.15.0-1191-azure" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "block-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "crypto-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "fat-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "fb-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "firewire-core-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "floppy-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "fs-core-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "input-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "ipmi-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "irda-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "kernel-image-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-buildinfo-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-buildinfo-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-headers-4.4.0-271" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-headers-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-headers-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-image-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-image-4.4.0-271-generic-dbgsym" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-271-generic-dbgsym" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency-dbgsym" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-271" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-lts-xenial-tools-4.4.0-271" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-lts-xenial-udebs-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-modules-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-modules-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-modules-extra-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-tools-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "linux-tools-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "md-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "message-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "mouse-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "multipath-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "nfs-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "nic-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "nic-pcmcia-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "nic-shared-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "nic-usb-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "parport-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "pata-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "pcmcia-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "pcmcia-storage-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "plip-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "ppp-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "sata-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "scsi-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "serial-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "speakup-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "storage-core-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "usb-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "virtio-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305~14.04.1", "binary_name": "vlan-modules-4.4.0-271-generic-di" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.4.0-271.305", "binary_name": "block-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "crypto-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "dasd-extra-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "dasd-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "fat-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "fb-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "firewire-core-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "floppy-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "fs-core-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "fs-secondary-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "input-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "ipmi-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "irda-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "kernel-image-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-buildinfo-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-buildinfo-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-cloud-tools-4.4.0-271" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-cloud-tools-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-cloud-tools-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-doc" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-headers-4.4.0-271" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-headers-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-headers-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-image-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-image-4.4.0-271-generic-dbgsym" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-image-unsigned-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-image-unsigned-4.4.0-271-generic-dbgsym" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency-dbgsym" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-libc-dev" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-modules-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-modules-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-modules-extra-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-source-4.4.0" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-tools-4.4.0-271" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-tools-4.4.0-271-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-tools-4.4.0-271-lowlatency" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-tools-common" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-tools-host" }, { "binary_version": "4.4.0-271.305", "binary_name": "linux-udebs-generic" }, { "binary_version": "4.4.0-271.305", "binary_name": "md-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "message-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "mouse-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "multipath-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "nfs-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "nic-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "nic-pcmcia-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "nic-shared-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "nic-usb-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "parport-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "pata-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "pcmcia-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "pcmcia-storage-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "plip-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "ppp-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "sata-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "scsi-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "serial-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "speakup-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "storage-core-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "usb-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "virtio-modules-4.4.0-271-generic-di" }, { "binary_version": "4.4.0-271.305", "binary_name": "vlan-modules-4.4.0-271-generic-di" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.4.0-1184.199", "binary_name": "linux-aws-cloud-tools-4.4.0-1184" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-aws-headers-4.4.0-1184" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-aws-tools-4.4.0-1184" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-buildinfo-4.4.0-1184-aws" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-cloud-tools-4.4.0-1184-aws" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-headers-4.4.0-1184-aws" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-image-4.4.0-1184-aws" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-image-4.4.0-1184-aws-dbgsym" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-modules-4.4.0-1184-aws" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-modules-extra-4.4.0-1184-aws" }, { "binary_version": "4.4.0-1184.199", "binary_name": "linux-tools-4.4.0-1184-aws" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-aws-headers-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-aws-hwe-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-headers-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1183-aws-dbgsym" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-modules-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-tools-4.15.0-1183-aws" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-azure-headers-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-azure-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-headers-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-modules-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-tools-4.15.0-1191-azure" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-gcp-headers-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-gcp-tools-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-headers-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp-dbgsym" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-modules-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-tools-4.15.0-1176-gcp" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "block-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "crypto-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "dasd-extra-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "dasd-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fat-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "firewire-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "floppy-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fs-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fs-secondary-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "input-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "ipmi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "irda-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "kernel-image-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-buildinfo-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-buildinfo-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-headers-4.15.0-240" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-headers-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-headers-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-hwe-cloud-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-hwe-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-hwe-udebs-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency-dbgsym" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-modules-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-modules-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-modules-extra-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "md-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "message-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "mouse-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "multipath-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nfs-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-shared-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "parport-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "pata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "plip-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "ppp-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "sata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "scsi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "serial-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "storage-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "virtio-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "vlan-modules-4.15.0-240-generic-di" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.4.0-1147.158", "binary_name": "linux-buildinfo-4.4.0-1147-kvm" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-cloud-tools-4.4.0-1147-kvm" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-headers-4.4.0-1147-kvm" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-image-4.4.0-1147-kvm" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-image-4.4.0-1147-kvm-dbgsym" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-kvm-cloud-tools-4.4.0-1147" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-kvm-headers-4.4.0-1147" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-kvm-tools-4.4.0-1147" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-modules-4.4.0-1147-kvm" }, { "binary_version": "4.4.0-1147.158", "binary_name": "linux-tools-4.4.0-1147-kvm" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-headers-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1145-oracle-dbgsym" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-modules-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-oracle-headers-4.15.0-1145" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-oracle-tools-4.15.0-1145" }, { "binary_version": "4.15.0-1145.156~16.04.1", "binary_name": "linux-tools-4.15.0-1145-oracle" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.4.0-1116.123", "binary_name": "block-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "crypto-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "dasd-extra-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "dasd-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "fat-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "fb-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "firewire-core-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "floppy-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "fs-core-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "fs-secondary-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "input-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "ipmi-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "irda-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "kernel-image-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-buildinfo-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-fips-cloud-tools-common" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-fips-headers-4.4.0-1116" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-fips-source-4.4.0" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-fips-tools-4.4.0-1116" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-headers-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-image-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-image-4.4.0-1116-fips-dbgsym" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-image-hmac-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-image-unsigned-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-image-unsigned-4.4.0-1116-fips-dbgsym" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-image-unsigned-hmac-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-modules-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-modules-extra-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-tools-4.4.0-1116-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "linux-udebs-fips" }, { "binary_version": "4.4.0-1116.123", "binary_name": "md-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "message-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "mouse-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "multipath-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "nfs-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "nic-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "nic-pcmcia-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "nic-shared-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "nic-usb-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "parport-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "pata-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "pcmcia-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "pcmcia-storage-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "plip-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "ppp-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "sata-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "scsi-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "serial-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "speakup-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "storage-core-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "usb-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "virtio-modules-4.4.0-1116-fips-di" }, { "binary_version": "4.4.0-1116.123", "binary_name": "vlan-modules-4.4.0-1116-fips-di" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-240.252", "binary_name": "block-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "crypto-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "dasd-extra-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "dasd-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fat-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "firewire-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "floppy-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fs-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fs-secondary-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "input-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "ipmi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "irda-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "kernel-image-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-buildinfo-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-buildinfo-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-doc" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-headers-4.15.0-240" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-headers-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-headers-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency-dbgsym" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-libc-dev" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-modules-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-modules-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-modules-extra-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-source-4.15.0" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-common" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-host" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-udebs-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "md-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "message-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "mouse-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "multipath-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nfs-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-shared-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "parport-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "pata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "plip-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "ppp-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "sata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "scsi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "serial-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "storage-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "virtio-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "vlan-modules-4.15.0-240-generic-di" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1183.196", "binary_name": "linux-aws-cloud-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-aws-headers-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-aws-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-buildinfo-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-cloud-tools-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-headers-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-image-unsigned-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-image-unsigned-4.15.0-1183-aws-dbgsym" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-modules-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-modules-extra-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-tools-4.15.0-1183-aws" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-aws-5.4-headers-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-aws-5.4-tools-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-headers-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1149-aws-dbgsym" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-modules-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159~18.04.1", "binary_name": "linux-tools-5.4.0-1149-aws" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1191.206", "binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-azure-4.15-headers-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-azure-4.15-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-buildinfo-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-cloud-tools-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-headers-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-image-unsigned-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-modules-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-modules-extra-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-tools-4.15.0-1191-azure" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1176.193", "binary_name": "linux-buildinfo-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-gcp-4.15-headers-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-gcp-4.15-tools-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-headers-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp-dbgsym" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-modules-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-modules-extra-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-tools-4.15.0-1176-gcp" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-gcp-5.4-headers-5.4.0-1152" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-gcp-5.4-tools-5.4.0-1152" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-headers-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1152-gcp-dbgsym" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-modules-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161~18.04.1", "binary_name": "linux-tools-5.4.0-1152-gcp" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "block-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "crypto-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "dasd-extra-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "dasd-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "fat-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "fb-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "firewire-core-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "floppy-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "fs-core-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "fs-secondary-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "input-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "ipmi-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "kernel-image-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-buildinfo-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-buildinfo-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-headers-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-headers-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-220" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-hwe-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-hwe-5.4-headers-5.4.0-220" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-hwe-5.4-source-5.4.0" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-hwe-5.4-tools-5.4.0-220" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-hwe-5.4-tools-common" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-hwe-5.4-udebs-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-220-generic-dbgsym" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-220-lowlatency-dbgsym" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-modules-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-modules-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-modules-extra-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-tools-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "linux-tools-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "md-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "message-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "mouse-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "multipath-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "nfs-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "nic-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "nic-pcmcia-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "nic-shared-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "nic-usb-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "parport-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "pata-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "pcmcia-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "pcmcia-storage-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "plip-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "ppp-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "sata-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "scsi-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "serial-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "storage-core-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "usb-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "virtio-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240~18.04.1", "binary_name": "vlan-modules-5.4.0-220-generic-di" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-headers-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-ibm-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-ibm-5.4-headers-5.4.0-1095" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-ibm-5.4-source-5.4.0" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-ibm-5.4-tools-5.4.0-1095" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-ibm-5.4-tools-common" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1095-ibm-dbgsym" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-modules-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100~18.04.1", "binary_name": "linux-tools-5.4.0-1095-ibm" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1166.171", "binary_name": "linux-buildinfo-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-headers-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-image-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-image-4.15.0-1166-kvm-dbgsym" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-kvm-headers-4.15.0-1166" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-kvm-tools-4.15.0-1166" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-modules-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-tools-4.15.0-1166-kvm" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1145.156", "binary_name": "linux-buildinfo-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-headers-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-image-unsigned-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-image-unsigned-4.15.0-1145-oracle-dbgsym" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-modules-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-modules-extra-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-oracle-headers-4.15.0-1145" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-oracle-tools-4.15.0-1145" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-tools-4.15.0-1145-oracle" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-headers-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-image-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-image-5.4.0-1132-raspi-dbgsym" }, { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-modules-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-raspi-5.4-headers-5.4.0-1132" }, { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-raspi-5.4-tools-5.4.0-1132" }, { "binary_version": "5.4.0-1132.145~18.04.1", "binary_name": "linux-tools-5.4.0-1132-raspi" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-2121.127", "binary_name": "linux-aws-fips-headers-4.15.0-2121" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-aws-fips-tools-4.15.0-2121" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-buildinfo-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-headers-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-image-unsigned-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-image-unsigned-4.15.0-2121-aws-fips-dbgsym" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-image-unsigned-hmac-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-modules-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-modules-extra-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-tools-4.15.0-2121-aws-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-2100.106", "binary_name": "linux-azure-fips-cloud-tools-4.15.0-2100" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-azure-fips-headers-4.15.0-2100" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-azure-fips-tools-4.15.0-2100" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-buildinfo-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-cloud-tools-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-headers-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-image-unsigned-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-image-unsigned-4.15.0-2100-azure-fips-dbgsym" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-image-unsigned-hmac-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-modules-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-modules-extra-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-tools-4.15.0-2100-azure-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-1138.149", "binary_name": "linux-buildinfo-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-fips-headers-4.15.0-1138" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-fips-tools-4.15.0-1138" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-fips-tools-host" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-headers-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-4.15.0-1138-fips-dbgsym" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-hmac-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-unsigned-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-unsigned-4.15.0-1138-fips-dbgsym" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-unsigned-hmac-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-modules-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-modules-extra-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-tools-4.15.0-1138-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "4.15.0-2084.90", "binary_name": "linux-buildinfo-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-gcp-fips-headers-4.15.0-2084" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-gcp-fips-tools-4.15.0-2084" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-headers-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-image-unsigned-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-image-unsigned-4.15.0-2084-gcp-fips-dbgsym" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-image-unsigned-hmac-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-modules-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-modules-extra-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-tools-4.15.0-2084-gcp-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-aws-5.15-headers-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-aws-5.15-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-headers-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1080-aws-dbgsym" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-modules-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87~20.04.1", "binary_name": "linux-tools-5.15.0-1080-aws" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1086" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-azure-5.15-headers-5.15.0-1086" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-azure-5.15-tools-5.15.0-1086" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1086-azure" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1086-azure" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-headers-5.15.0-1086-azure" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1086-azure" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1086-azure-dbgsym" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-modules-5.15.0-1086-azure" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1086-azure" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-modules-involflt-5.15.0-1086-azure" }, { "binary_version": "5.15.0-1086.95~20.04.1", "binary_name": "linux-tools-5.15.0-1086-azure" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1081-gcp" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-gcp-5.15-headers-5.15.0-1081" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-gcp-5.15-tools-5.15.0-1081" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-headers-5.15.0-1081-gcp" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1081-gcp" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1081-gcp-dbgsym" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-modules-5.15.0-1081-gcp" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1081-gcp" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1081-gcp" }, { "binary_version": "5.15.0-1081.90~20.04.1", "binary_name": "linux-tools-5.15.0-1081-gcp" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-buildinfo-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-buildinfo-5.15.0-136-generic-64k" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-buildinfo-5.15.0-136-generic-lpae" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-headers-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-headers-5.15.0-136-generic-64k" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-headers-5.15.0-136-generic-lpae" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-136" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-hwe-5.15-headers-5.15.0-136" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-hwe-5.15-tools-5.15.0-136" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-5.15.0-136-generic-dbgsym" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-5.15.0-136-generic-lpae" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-5.15.0-136-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-136-generic-64k" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-136-generic-64k-dbgsym" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-136-generic-dbgsym" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-modules-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-modules-5.15.0-136-generic-64k" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-modules-5.15.0-136-generic-lpae" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-modules-extra-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-tools-5.15.0-136-generic" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-tools-5.15.0-136-generic-64k" }, { "binary_version": "5.15.0-136.147~20.04.1", "binary_name": "linux-tools-5.15.0-136-generic-lpae" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1074-ibm" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-headers-5.15.0-1074-ibm" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-ibm-5.15-headers-5.15.0-1074" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-ibm-5.15-source-5.15.0" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-ibm-5.15-tools-5.15.0-1074" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1074-ibm" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1074-ibm-dbgsym" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-modules-5.15.0-1074-ibm" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1074-ibm" }, { "binary_version": "5.15.0-1074.77~20.04.1", "binary_name": "linux-tools-5.15.0-1074-ibm" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1077-intel-iotg" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1077-intel-iotg" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-headers-5.15.0-1077-intel-iotg" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1077-intel-iotg" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1077-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-common" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-host" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-modules-5.15.0-1077-intel-iotg" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1077-intel-iotg" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1077-intel-iotg" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-tools-5.15.0-1077-intel-iotg" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-buildinfo-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-headers-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-headers-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-dbgsym" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-135" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-135" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-135" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-modules-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-modules-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-tools-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146~20.04.1", "binary_name": "linux-tools-5.15.0-135-lowlatency-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-headers-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1077-oracle-dbgsym" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-modules-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-oracle-5.15-headers-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-oracle-5.15-tools-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83~20.04.1", "binary_name": "linux-tools-5.15.0-1077-oracle" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1075-generic" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-headers-5.15.0-1075-generic" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-image-5.15.0-1075-generic" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-image-5.15.0-1075-generic-dbgsym" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-modules-5.15.0-1075-generic" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1075-generic" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-riscv-5.15-headers-5.15.0-1075" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-riscv-5.15-tools-5.15.0-1075" }, { "binary_version": "5.15.0-1075.79~20.04.1", "binary_name": "linux-tools-5.15.0-1075-generic" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-220.240", "binary_name": "block-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "block-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "crypto-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "crypto-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "dasd-extra-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "dasd-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "fat-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "fat-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "fb-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "firewire-core-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "floppy-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "fs-core-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "fs-core-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "fs-secondary-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "fs-secondary-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "input-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "input-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "ipmi-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "ipmi-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "kernel-image-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "kernel-image-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-buildinfo-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-buildinfo-5.4.0-220-generic-lpae" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-buildinfo-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-cloud-tools-5.4.0-220" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-cloud-tools-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-cloud-tools-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-doc" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-headers-5.4.0-220" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-headers-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-headers-5.4.0-220-generic-lpae" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-headers-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-5.4.0-220-generic-dbgsym" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-5.4.0-220-generic-lpae" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-5.4.0-220-generic-lpae-dbgsym" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-unsigned-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-unsigned-5.4.0-220-generic-dbgsym" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-unsigned-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-image-unsigned-5.4.0-220-lowlatency-dbgsym" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-libc-dev" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-modules-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-modules-5.4.0-220-generic-lpae" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-modules-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-modules-extra-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-source-5.4.0" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-tools-5.4.0-220" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-tools-5.4.0-220-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-tools-5.4.0-220-generic-lpae" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-tools-5.4.0-220-lowlatency" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-tools-common" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-tools-host" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-udebs-generic" }, { "binary_version": "5.4.0-220.240", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "5.4.0-220.240", "binary_name": "md-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "md-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "message-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "mouse-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "mouse-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "multipath-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "multipath-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nfs-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nfs-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nic-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nic-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nic-pcmcia-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nic-shared-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nic-shared-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nic-usb-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "nic-usb-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "parport-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "parport-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "pata-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "pcmcia-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "pcmcia-storage-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "plip-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "plip-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "ppp-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "ppp-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "sata-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "sata-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "scsi-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "scsi-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "serial-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "storage-core-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "storage-core-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "usb-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "usb-modules-5.4.0-220-generic-lpae-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "virtio-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "vlan-modules-5.4.0-220-generic-di" }, { "binary_version": "5.4.0-220.240", "binary_name": "vlan-modules-5.4.0-220-generic-lpae-di" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1149.159", "binary_name": "linux-aws-cloud-tools-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-aws-headers-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-aws-tools-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-buildinfo-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-cloud-tools-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-headers-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-image-unsigned-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-image-unsigned-5.4.0-1149-aws-dbgsym" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-modules-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-modules-extra-5.4.0-1149-aws" }, { "binary_version": "5.4.0-1149.159", "binary_name": "linux-tools-5.4.0-1149-aws" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1108.115", "binary_name": "linux-bluefield-headers-5.4.0-1108" }, { "binary_version": "5.4.0-1108.115", "binary_name": "linux-bluefield-tools-5.4.0-1108" }, { "binary_version": "5.4.0-1108.115", "binary_name": "linux-buildinfo-5.4.0-1108-bluefield" }, { "binary_version": "5.4.0-1108.115", "binary_name": "linux-headers-5.4.0-1108-bluefield" }, { "binary_version": "5.4.0-1108.115", "binary_name": "linux-image-unsigned-5.4.0-1108-bluefield" }, { "binary_version": "5.4.0-1108.115", "binary_name": "linux-image-unsigned-5.4.0-1108-bluefield-dbgsym" }, { "binary_version": "5.4.0-1108.115", "binary_name": "linux-modules-5.4.0-1108-bluefield" }, { "binary_version": "5.4.0-1108.115", "binary_name": "linux-tools-5.4.0-1108-bluefield" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1152.161", "binary_name": "linux-buildinfo-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-gcp-headers-5.4.0-1152" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-gcp-tools-5.4.0-1152" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-headers-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-image-unsigned-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-image-unsigned-5.4.0-1152-gcp-dbgsym" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-modules-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-modules-extra-5.4.0-1152-gcp" }, { "binary_version": "5.4.0-1152.161", "binary_name": "linux-tools-5.4.0-1152-gcp" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1095.100", "binary_name": "linux-buildinfo-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-headers-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-ibm-headers-5.4.0-1095" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-ibm-source-5.4.0" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-ibm-tools-5.4.0-1095" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-image-unsigned-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-image-unsigned-5.4.0-1095-ibm-dbgsym" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-modules-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-modules-extra-5.4.0-1095-ibm" }, { "binary_version": "5.4.0-1095.100", "binary_name": "linux-tools-5.4.0-1095-ibm" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1053.56", "binary_name": "linux-buildinfo-5.4.0-1053-iot" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-headers-5.4.0-1053-iot" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-image-5.4.0-1053-iot" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-image-5.4.0-1053-iot-dbgsym" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-image-unsigned-5.4.0-1053-iot" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-image-unsigned-5.4.0-1053-iot-dbgsym" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-iot-headers-5.4.0-1053" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-iot-tools-5.4.0-1053" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-modules-5.4.0-1053-iot" }, { "binary_version": "5.4.0-1053.56", "binary_name": "linux-tools-5.4.0-1053-iot" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1136.145", "binary_name": "linux-buildinfo-5.4.0-1136-kvm" }, { "binary_version": "5.4.0-1136.145", "binary_name": "linux-headers-5.4.0-1136-kvm" }, { "binary_version": "5.4.0-1136.145", "binary_name": "linux-image-unsigned-5.4.0-1136-kvm" }, { "binary_version": "5.4.0-1136.145", "binary_name": "linux-image-unsigned-5.4.0-1136-kvm-dbgsym" }, { "binary_version": "5.4.0-1136.145", "binary_name": "linux-kvm-headers-5.4.0-1136" }, { "binary_version": "5.4.0-1136.145", "binary_name": "linux-kvm-tools-5.4.0-1136" }, { "binary_version": "5.4.0-1136.145", "binary_name": "linux-modules-5.4.0-1136-kvm" }, { "binary_version": "5.4.0-1136.145", "binary_name": "linux-tools-5.4.0-1136-kvm" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-headers-5.15.0-1039-nvidia-tegra" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-headers-5.15.0-1039-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-dbgsym" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt-dbgsym" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-modules-5.15.0-1039-nvidia-tegra" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-modules-5.15.0-1039-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1039-nvidia-tegra" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1039" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1039" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-tools-5.15.0-1039-nvidia-tegra" }, { "binary_version": "5.15.0-1039.39~20.04.1", "binary_name": "linux-tools-5.15.0-1039-nvidia-tegra-rt" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1147.157", "binary_name": "linux-buildinfo-5.4.0-1147-oracle" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-headers-5.4.0-1147-oracle" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-image-unsigned-5.4.0-1147-oracle" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-image-unsigned-5.4.0-1147-oracle-dbgsym" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-modules-5.4.0-1147-oracle" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-modules-extra-5.4.0-1147-oracle" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-oracle-headers-5.4.0-1147" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-oracle-tools-5.4.0-1147" }, { "binary_version": "5.4.0-1147.157", "binary_name": "linux-tools-5.4.0-1147-oracle" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1132.145", "binary_name": "linux-buildinfo-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145", "binary_name": "linux-headers-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145", "binary_name": "linux-image-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145", "binary_name": "linux-image-5.4.0-1132-raspi-dbgsym" }, { "binary_version": "5.4.0-1132.145", "binary_name": "linux-modules-5.4.0-1132-raspi" }, { "binary_version": "5.4.0-1132.145", "binary_name": "linux-raspi-headers-5.4.0-1132" }, { "binary_version": "5.4.0-1132.145", "binary_name": "linux-raspi-tools-5.4.0-1132" }, { "binary_version": "5.4.0-1132.145", "binary_name": "linux-tools-5.4.0-1132-raspi" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1067.71", "binary_name": "linux-buildinfo-5.4.0-1067-xilinx-zynqmp" }, { "binary_version": "5.4.0-1067.71", "binary_name": "linux-headers-5.4.0-1067-xilinx-zynqmp" }, { "binary_version": "5.4.0-1067.71", "binary_name": "linux-image-5.4.0-1067-xilinx-zynqmp" }, { "binary_version": "5.4.0-1067.71", "binary_name": "linux-image-5.4.0-1067-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.4.0-1067.71", "binary_name": "linux-modules-5.4.0-1067-xilinx-zynqmp" }, { "binary_version": "5.4.0-1067.71", "binary_name": "linux-tools-5.4.0-1067-xilinx-zynqmp" }, { "binary_version": "5.4.0-1067.71", "binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1067" }, { "binary_version": "5.4.0-1067.71", "binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1067" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-aws-fips-headers-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-aws-fips-tools-5.4.0-1149" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-buildinfo-5.4.0-1149-aws-fips" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-headers-5.4.0-1149-aws-fips" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-image-unsigned-5.4.0-1149-aws-fips" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-image-unsigned-5.4.0-1149-aws-fips-dbgsym" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1149-aws-fips" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-modules-5.4.0-1149-aws-fips" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-modules-extra-5.4.0-1149-aws-fips" }, { "binary_version": "5.4.0-1149.159+fips1", "binary_name": "linux-tools-5.4.0-1149-aws-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1123.133", "binary_name": "linux-buildinfo-5.4.0-1123-fips" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-fips-headers-5.4.0-1123" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-fips-tools-5.4.0-1123" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-fips-tools-host" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-headers-5.4.0-1123-fips" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-image-unsigned-5.4.0-1123-fips" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-image-unsigned-5.4.0-1123-fips-dbgsym" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-image-unsigned-hmac-5.4.0-1123-fips" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-modules-5.4.0-1123-fips" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-modules-extra-5.4.0-1123-fips" }, { "binary_version": "5.4.0-1123.133", "binary_name": "linux-tools-5.4.0-1123-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-buildinfo-5.4.0-1152-gcp-fips" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-gcp-fips-headers-5.4.0-1152" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-gcp-fips-tools-5.4.0-1152" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-headers-5.4.0-1152-gcp-fips" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-image-unsigned-5.4.0-1152-gcp-fips" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-image-unsigned-5.4.0-1152-gcp-fips-dbgsym" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1152-gcp-fips" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-modules-5.4.0-1152-gcp-fips" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-modules-extra-5.4.0-1152-gcp-fips" }, { "binary_version": "5.4.0-1152.161+fips1", "binary_name": "linux-tools-5.4.0-1152-gcp-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-135.146", "binary_name": "linux-buildinfo-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-buildinfo-5.15.0-135-generic-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-buildinfo-5.15.0-135-generic-lpae" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-cloud-tools-5.15.0-135" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-cloud-tools-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-doc" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-headers-5.15.0-135" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-headers-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-headers-5.15.0-135-generic-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-headers-5.15.0-135-generic-lpae" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-5.15.0-135-generic-dbgsym" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-5.15.0-135-generic-lpae" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-5.15.0-135-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-generic-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-generic-64k-dbgsym" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-generic-dbgsym" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-libc-dev" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-5.15.0-135-generic-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-5.15.0-135-generic-lpae" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-extra-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-iwlwifi-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-source-5.15.0" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-5.15.0-135" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-5.15.0-135-generic" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-5.15.0-135-generic-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-5.15.0-135-generic-lpae" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-common" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-host" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1080.87", "binary_name": "linux-aws-cloud-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-aws-headers-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-aws-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-buildinfo-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-cloud-tools-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-headers-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-image-unsigned-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-image-unsigned-5.15.0-1080-aws-dbgsym" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-modules-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-modules-extra-5.15.0-1080-aws" }, { "binary_version": "5.15.0-1080.87", "binary_name": "linux-tools-5.15.0-1080-aws" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1023" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-aws-6.8-headers-6.8.0-1023" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-aws-6.8-tools-6.8.0-1023" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-headers-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-modules-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25~22.04.1", "binary_name": "linux-tools-6.8.0-1023-aws" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1084.93", "binary_name": "linux-azure-cloud-tools-5.15.0-1084" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-azure-headers-5.15.0-1084" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-azure-tools-5.15.0-1084" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-buildinfo-5.15.0-1084-azure" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-cloud-tools-5.15.0-1084-azure" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-headers-5.15.0-1084-azure" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-image-unsigned-5.15.0-1084-azure" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-image-unsigned-5.15.0-1084-azure-dbgsym" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-modules-5.15.0-1084-azure" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-modules-extra-5.15.0-1084-azure" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-modules-involflt-5.15.0-1084-azure" }, { "binary_version": "5.15.0-1084.93", "binary_name": "linux-tools-5.15.0-1084-azure" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1025" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-azure-6.8-headers-6.8.0-1025" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-azure-6.8-tools-6.8.0-1025" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-headers-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-modules-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-modules-involflt-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30~22.04.1", "binary_name": "linux-tools-6.8.0-1025-azure" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1079.88", "binary_name": "linux-buildinfo-5.15.0-1079-gcp" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-gcp-headers-5.15.0-1079" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-gcp-tools-5.15.0-1079" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-headers-5.15.0-1079-gcp" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-image-unsigned-5.15.0-1079-gcp" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-dbgsym" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-modules-5.15.0-1079-gcp" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-modules-extra-5.15.0-1079-gcp" }, { "binary_version": "5.15.0-1079.88", "binary_name": "linux-tools-5.15.0-1079-gcp" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-gcp-6.8-headers-6.8.0-1024" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-gcp-6.8-tools-6.8.0-1024" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-headers-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-headers-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-modules-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-modules-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-tools-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26~22.04.1", "binary_name": "linux-tools-6.8.0-1024-gcp-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1077.83", "binary_name": "linux-buildinfo-5.15.0-1077-gke" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-gke-headers-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-gke-tools-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-headers-5.15.0-1077-gke" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-image-unsigned-5.15.0-1077-gke" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-image-unsigned-5.15.0-1077-gke-dbgsym" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-modules-5.15.0-1077-gke" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-modules-extra-5.15.0-1077-gke" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-tools-5.15.0-1077-gke" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1062.70", "binary_name": "linux-buildinfo-5.15.0-1062-gkeop" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-cloud-tools-5.15.0-1062-gkeop" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-gkeop-cloud-tools-5.15.0-1062" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-gkeop-headers-5.15.0-1062" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-gkeop-tools-5.15.0-1062" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-headers-5.15.0-1062-gkeop" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-image-unsigned-5.15.0-1062-gkeop" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-image-unsigned-5.15.0-1062-gkeop-dbgsym" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-modules-5.15.0-1062-gkeop" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-modules-extra-5.15.0-1062-gkeop" }, { "binary_version": "5.15.0-1062.70", "binary_name": "linux-tools-5.15.0-1062-gkeop" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-buildinfo-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-buildinfo-6.8.0-57-generic-64k" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-headers-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-headers-6.8.0-57-generic-64k" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-57" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-hwe-6.8-headers-6.8.0-57" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-hwe-6.8-tools-6.8.0-57" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-image-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-image-6.8.0-57-generic-dbgsym" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k-dbgsym" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-57-generic-dbgsym" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-modules-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-modules-6.8.0-57-generic-64k" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-modules-extra-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-modules-ipu6-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-modules-usbio-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-tools-6.8.0-57-generic" }, { "binary_version": "6.8.0-57.59~22.04.1", "binary_name": "linux-tools-6.8.0-57-generic-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1072.75", "binary_name": "linux-buildinfo-5.15.0-1072-ibm" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-headers-5.15.0-1072-ibm" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-ibm-headers-5.15.0-1072" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-ibm-source-5.15.0" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-ibm-tools-5.15.0-1072" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-image-unsigned-5.15.0-1072-ibm" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-image-unsigned-5.15.0-1072-ibm-dbgsym" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-modules-5.15.0-1072-ibm" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-modules-extra-5.15.0-1072-ibm" }, { "binary_version": "5.15.0-1072.75", "binary_name": "linux-tools-5.15.0-1072-ibm" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1023-ibm" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-headers-6.8.0-1023-ibm" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-ibm-6.8-headers-6.8.0-1023" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-ibm-6.8-tools-6.8.0-1023" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1023-ibm" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1023-ibm-dbgsym" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-modules-6.8.0-1023-ibm" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1023-ibm" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1023-ibm" }, { "binary_version": "6.8.0-1023.23~22.04.1", "binary_name": "linux-tools-6.8.0-1023-ibm" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1073.75", "binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime-dbgsym" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-intel-iot-realtime-cloud-tools-common" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-intel-iot-realtime-tools-common" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-intel-iot-realtime-tools-host" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime" }, { "binary_version": "5.15.0-1073.75", "binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1075.81", "binary_name": "linux-buildinfo-5.15.0-1075-intel-iotg" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-cloud-tools-5.15.0-1075-intel-iotg" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-headers-5.15.0-1075-intel-iotg" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-image-unsigned-5.15.0-1075-intel-iotg" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-image-unsigned-5.15.0-1075-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1075" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-intel-iotg-cloud-tools-common" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-intel-iotg-headers-5.15.0-1075" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-intel-iotg-tools-5.15.0-1075" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-intel-iotg-tools-common" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-intel-iotg-tools-host" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-modules-5.15.0-1075-intel-iotg" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-modules-extra-5.15.0-1075-intel-iotg" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-modules-iwlwifi-5.15.0-1075-intel-iotg" }, { "binary_version": "5.15.0-1075.81", "binary_name": "linux-tools-5.15.0-1075-intel-iotg" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1076.81", "binary_name": "linux-buildinfo-5.15.0-1076-kvm" }, { "binary_version": "5.15.0-1076.81", "binary_name": "linux-headers-5.15.0-1076-kvm" }, { "binary_version": "5.15.0-1076.81", "binary_name": "linux-image-unsigned-5.15.0-1076-kvm" }, { "binary_version": "5.15.0-1076.81", "binary_name": "linux-image-unsigned-5.15.0-1076-kvm-dbgsym" }, { "binary_version": "5.15.0-1076.81", "binary_name": "linux-kvm-headers-5.15.0-1076" }, { "binary_version": "5.15.0-1076.81", "binary_name": "linux-kvm-tools-5.15.0-1076" }, { "binary_version": "5.15.0-1076.81", "binary_name": "linux-modules-5.15.0-1076-kvm" }, { "binary_version": "5.15.0-1076.81", "binary_name": "linux-tools-5.15.0-1076-kvm" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-135.146", "binary_name": "linux-buildinfo-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-cloud-tools-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-headers-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-headers-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-dbgsym" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-lowlatency-cloud-tools-5.15.0-135" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-lowlatency-headers-5.15.0-135" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-lowlatency-tools-5.15.0-135" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-5.15.0-135-lowlatency-64k" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-5.15.0-135-lowlatency" }, { "binary_version": "5.15.0-135.146", "binary_name": "linux-tools-5.15.0-135-lowlatency-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-buildinfo-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-headers-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-headers-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-54" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-54" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-54" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-modules-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-modules-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-tools-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1~22.04.1", "binary_name": "linux-tools-6.8.0-54-lowlatency-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1074.75", "binary_name": "linux-buildinfo-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-buildinfo-5.15.0-1074-nvidia-lowlatency" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-cloud-tools-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-cloud-tools-5.15.0-1074-nvidia-lowlatency" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-headers-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-headers-5.15.0-1074-nvidia-lowlatency" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-dbgsym" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-lowlatency" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-lowlatency-dbgsym" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-modules-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-modules-5.15.0-1074-nvidia-lowlatency" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-modules-extra-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia-lowlatency" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-nvidia-cloud-tools-5.15.0-1074" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-nvidia-cloud-tools-common" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-nvidia-headers-5.15.0-1074" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-nvidia-tools-5.15.0-1074" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-nvidia-tools-common" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-nvidia-tools-host" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-tools-5.15.0-1074-nvidia" }, { "binary_version": "5.15.0-1074.75", "binary_name": "linux-tools-5.15.0-1074-nvidia-lowlatency" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-buildinfo-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-headers-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-headers-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-modules-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-modules-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-modules-extra-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-nvidia-6.8-headers-6.8.0-1022" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-nvidia-6.8-tools-6.8.0-1022" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-tools-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25~22.04.2", "binary_name": "linux-tools-6.8.0-1022-nvidia-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1033.33", "binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-headers-5.15.0-1033-nvidia-tegra" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-headers-5.15.0-1033-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-dbgsym" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-rt-dbgsym" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-modules-5.15.0-1033-nvidia-tegra" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-modules-5.15.0-1033-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-modules-extra-5.15.0-1033-nvidia-tegra" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-nvidia-tegra-headers-5.15.0-1033" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-nvidia-tegra-tools-5.15.0-1033" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-tools-5.15.0-1033-nvidia-tegra" }, { "binary_version": "5.15.0-1033.33", "binary_name": "linux-tools-5.15.0-1033-nvidia-tegra-rt" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1021.21", "binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-dbgsym" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-rt-dbgsym" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-modules-extra-5.15.0-1021-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1021" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1021" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1021.21", "binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx-rt" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1077.83", "binary_name": "linux-buildinfo-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-headers-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-image-unsigned-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-image-unsigned-5.15.0-1077-oracle-dbgsym" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-modules-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-modules-extra-5.15.0-1077-oracle" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-oracle-headers-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-oracle-tools-5.15.0-1077" }, { "binary_version": "5.15.0-1077.83", "binary_name": "linux-tools-5.15.0-1077-oracle" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-headers-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-headers-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-modules-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-modules-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-oracle-6.8-headers-6.8.0-1020" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-oracle-6.8-tools-6.8.0-1020" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-tools-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21~22.04.1", "binary_name": "linux-tools-6.8.0-1020-oracle-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1074.77", "binary_name": "linux-buildinfo-5.15.0-1074-raspi" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-headers-5.15.0-1074-raspi" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-image-5.15.0-1074-raspi" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-image-5.15.0-1074-raspi-dbgsym" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-modules-5.15.0-1074-raspi" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-modules-extra-5.15.0-1074-raspi" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-raspi-headers-5.15.0-1074" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-raspi-tools-5.15.0-1074" }, { "binary_version": "5.15.0-1074.77", "binary_name": "linux-tools-5.15.0-1074-raspi" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-buildinfo-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-headers-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-image-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-image-6.8.0-53-generic-dbgsym" }, { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-modules-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-riscv-6.8-headers-6.8.0-53" }, { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-riscv-6.8-tools-6.8.0-53" }, { "binary_version": "6.8.0-53.55.1~22.04.1", "binary_name": "linux-tools-6.8.0-53-generic" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1044.48", "binary_name": "linux-buildinfo-5.15.0-1044-xilinx-zynqmp" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-headers-5.15.0-1044-xilinx-zynqmp" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-image-5.15.0-1044-xilinx-zynqmp" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-image-5.15.0-1044-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-modules-5.15.0-1044-xilinx-zynqmp" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-tools-5.15.0-1044-xilinx-zynqmp" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-xilinx-zynqmp-tools-common" }, { "binary_version": "5.15.0-1044.48", "binary_name": "linux-xilinx-zynqmp-tools-host" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1062.64", "binary_name": "linux-bluefield-cloud-tools-common" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-bluefield-headers-5.15.0-1062" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-bluefield-tools-5.15.0-1062" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-bluefield-tools-host" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-buildinfo-5.15.0-1062-bluefield" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-headers-5.15.0-1062-bluefield" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-image-unsigned-5.15.0-1062-bluefield" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-image-unsigned-5.15.0-1062-bluefield-dbgsym" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-modules-5.15.0-1062-bluefield" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-modules-extra-5.15.0-1062-bluefield" }, { "binary_version": "5.15.0-1062.64", "binary_name": "linux-tools-5.15.0-1062-bluefield" } ], "availability": "Available for NVIDIA BlueField platforms" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-aws-fips-headers-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-aws-fips-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-buildinfo-5.15.0-1080-aws-fips" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-cloud-tools-5.15.0-1080-aws-fips" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-headers-5.15.0-1080-aws-fips" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-image-unsigned-5.15.0-1080-aws-fips" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-image-unsigned-5.15.0-1080-aws-fips-dbgsym" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1080-aws-fips" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-modules-5.15.0-1080-aws-fips" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-modules-extra-5.15.0-1080-aws-fips" }, { "binary_version": "5.15.0-1080.87+fips1", "binary_name": "linux-tools-5.15.0-1080-aws-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1083" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-azure-fips-headers-5.15.0-1083" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-azure-fips-tools-5.15.0-1083" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-buildinfo-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-cloud-tools-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-headers-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-image-unsigned-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-image-unsigned-5.15.0-1083-azure-fips-dbgsym" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-modules-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-modules-extra-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-modules-involflt-5.15.0-1083-azure-fips" }, { "binary_version": "5.15.0-1083.92+fips1", "binary_name": "linux-tools-5.15.0-1083-azure-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-buildinfo-5.15.0-135-fips" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-fips-headers-5.15.0-135" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-fips-tools-5.15.0-135" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-headers-5.15.0-135-fips" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-image-unsigned-5.15.0-135-fips" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-image-unsigned-5.15.0-135-fips-dbgsym" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-135-fips" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-modules-5.15.0-135-fips" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-modules-extra-5.15.0-135-fips" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-modules-iwlwifi-5.15.0-135-fips" }, { "binary_version": "5.15.0-135.146+fips1", "binary_name": "linux-tools-5.15.0-135-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-buildinfo-5.15.0-1079-gcp-fips" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-gcp-fips-headers-5.15.0-1079" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-gcp-fips-tools-5.15.0-1079" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-headers-5.15.0-1079-gcp-fips" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-fips" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-fips-dbgsym" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1079-gcp-fips" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-modules-5.15.0-1079-gcp-fips" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-modules-extra-5.15.0-1079-gcp-fips" }, { "binary_version": "5.15.0-1079.88+fips1", "binary_name": "linux-tools-5.15.0-1079-gcp-fips" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "5.15.0-1080.88", "binary_name": "linux-buildinfo-5.15.0-1080-realtime" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-cloud-tools-5.15.0-1080-realtime" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-headers-5.15.0-1080-realtime" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-image-unsigned-5.15.0-1080-realtime" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-image-unsigned-5.15.0-1080-realtime-dbgsym" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-modules-5.15.0-1080-realtime" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-modules-extra-5.15.0-1080-realtime" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-modules-iwlwifi-5.15.0-1080-realtime" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-realtime-cloud-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-realtime-cloud-tools-common" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-realtime-headers-5.15.0-1080" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-realtime-tools-5.15.0-1080" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-realtime-tools-common" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-realtime-tools-host" }, { "binary_version": "5.15.0-1080.88", "binary_name": "linux-tools-5.15.0-1080-realtime" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-buildinfo-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-cloud-tools-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-headers-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-image-unsigned-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-image-unsigned-6.8.1-1016-realtime-dbgsym" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-modules-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-modules-extra-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-realtime-6.8-cloud-tools-6.8.1-1016" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-realtime-6.8-headers-6.8.1-1016" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-realtime-6.8-tools-6.8.1-1016" }, { "binary_version": "6.8.1-1016.17~22.04.1", "binary_name": "linux-tools-6.8.1-1016-realtime" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-54.56", "binary_name": "linux-bpf-dev" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-buildinfo-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-buildinfo-6.8.0-54-generic-64k" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-cloud-tools-6.8.0-54" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-cloud-tools-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-doc" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-headers-6.8.0-54" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-headers-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-headers-6.8.0-54-generic-64k" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-image-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-image-6.8.0-54-generic-dbgsym" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-image-unsigned-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k-dbgsym" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-image-unsigned-6.8.0-54-generic-dbgsym" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-lib-rust-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-libc-dev" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-modules-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-modules-6.8.0-54-generic-64k" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-modules-extra-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-modules-ipu6-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-modules-iwlwifi-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-modules-usbio-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-source-6.8.0" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-tools-6.8.0-54" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-tools-6.8.0-54-generic" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-tools-6.8.0-54-generic-64k" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-tools-common" }, { "binary_version": "6.8.0-54.56", "binary_name": "linux-tools-host" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1023.25", "binary_name": "linux-aws-cloud-tools-6.8.0-1023" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-aws-headers-6.8.0-1023" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-aws-tools-6.8.0-1023" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-buildinfo-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-cloud-tools-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-headers-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-image-unsigned-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-modules-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-modules-extra-6.8.0-1023-aws" }, { "binary_version": "6.8.0-1023.25", "binary_name": "linux-tools-6.8.0-1023-aws" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1025.30", "binary_name": "linux-azure-cloud-tools-6.8.0-1025" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-azure-headers-6.8.0-1025" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-azure-tools-6.8.0-1025" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-buildinfo-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-cloud-tools-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-headers-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-image-unsigned-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-modules-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-modules-extra-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-modules-involflt-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure" }, { "binary_version": "6.8.0-1025.30", "binary_name": "linux-tools-6.8.0-1025-azure" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1012" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-azure-6.11-headers-6.11.0-1012" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-azure-6.11-tools-6.11.0-1012" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-buildinfo-6.11.0-1012-azure" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-cloud-tools-6.11.0-1012-azure" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-headers-6.11.0-1012-azure" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1012-azure" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1012-azure-dbgsym" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-modules-6.11.0-1012-azure" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-modules-extra-6.11.0-1012-azure" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-modules-iwlwifi-6.11.0-1012-azure" }, { "binary_version": "6.11.0-1012.12~24.04.1", "binary_name": "linux-tools-6.11.0-1012-azure" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1014.15", "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1014" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-azure-nvidia-cloud-tools-common" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-azure-nvidia-headers-6.8.0-1014" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-azure-nvidia-tools-6.8.0-1014" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-buildinfo-6.8.0-1014-azure-nvidia" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-cloud-tools-6.8.0-1014-azure-nvidia" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-headers-6.8.0-1014-azure-nvidia" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia-dbgsym" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-modules-6.8.0-1014-azure-nvidia" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-modules-extra-6.8.0-1014-azure-nvidia" }, { "binary_version": "6.8.0-1014.15", "binary_name": "linux-tools-6.8.0-1014-azure-nvidia" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1024.26", "binary_name": "linux-buildinfo-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-gcp-headers-6.8.0-1024" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-gcp-tools-6.8.0-1024" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-headers-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-headers-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-modules-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-modules-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-modules-extra-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-tools-6.8.0-1024-gcp" }, { "binary_version": "6.8.0-1024.26", "binary_name": "linux-tools-6.8.0-1024-gcp-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-buildinfo-6.11.0-1011-gcp" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-buildinfo-6.11.0-1011-gcp-64k" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-gcp-6.11-headers-6.11.0-1011" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1011-gcp" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-gcp-6.11-tools-6.11.0-1011" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-headers-6.11.0-1011-gcp" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-headers-6.11.0-1011-gcp-64k" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1011-gcp" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k-dbgsym" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-dbgsym" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-modules-6.11.0-1011-gcp" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-modules-6.11.0-1011-gcp-64k" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-modules-extra-6.11.0-1011-gcp" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-modules-extra-6.11.0-1011-gcp-64k" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-tools-6.11.0-1011-gcp" }, { "binary_version": "6.11.0-1011.11~24.04.1", "binary_name": "linux-tools-6.11.0-1011-gcp-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1019.23", "binary_name": "linux-buildinfo-6.8.0-1019-gke" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-gke-headers-6.8.0-1019" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-gke-tools-6.8.0-1019" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-headers-6.8.0-1019-gke" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-image-unsigned-6.8.0-1019-gke" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-image-unsigned-6.8.0-1019-gke-dbgsym" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-modules-6.8.0-1019-gke" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-modules-extra-6.8.0-1019-gke" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-modules-iwlwifi-6.8.0-1019-gke" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-tools-6.8.0-1019-gke" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1006.8", "binary_name": "linux-buildinfo-6.8.0-1006-gkeop" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-cloud-tools-6.8.0-1006-gkeop" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-gkeop-cloud-tools-6.8.0-1006" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-gkeop-headers-6.8.0-1006" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-gkeop-tools-6.8.0-1006" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-headers-6.8.0-1006-gkeop" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop-dbgsym" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-modules-6.8.0-1006-gkeop" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-modules-extra-6.8.0-1006-gkeop" }, { "binary_version": "6.8.0-1006.8", "binary_name": "linux-tools-6.8.0-1006-gkeop" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1022.22", "binary_name": "linux-buildinfo-6.8.0-1022-ibm" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-headers-6.8.0-1022-ibm" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-ibm-headers-6.8.0-1022" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-ibm-tools-6.8.0-1022" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-image-unsigned-6.8.0-1022-ibm" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-image-unsigned-6.8.0-1022-ibm-dbgsym" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-modules-6.8.0-1022-ibm" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-modules-extra-6.8.0-1022-ibm" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-modules-iwlwifi-6.8.0-1022-ibm" }, { "binary_version": "6.8.0-1022.22", "binary_name": "linux-tools-6.8.0-1022-ibm" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-buildinfo-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-headers-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-headers-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-lowlatency-cloud-tools-6.8.0-54" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-lowlatency-headers-6.8.0-54" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-lowlatency-lib-rust-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-lowlatency-tools-6.8.0-54" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-modules-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-modules-6.8.0-54-lowlatency-64k" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-tools-6.8.0-54-lowlatency" }, { "binary_version": "6.8.0-54.56.1", "binary_name": "linux-tools-6.8.0-54-lowlatency-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1022.25", "binary_name": "linux-buildinfo-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-headers-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-headers-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-modules-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-modules-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-modules-extra-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-nvidia-headers-6.8.0-1022" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-nvidia-tools-6.8.0-1022" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-tools-6.8.0-1022-nvidia" }, { "binary_version": "6.8.0-1022.25", "binary_name": "linux-tools-6.8.0-1022-nvidia-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.11.0-1007.7", "binary_name": "linux-buildinfo-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-buildinfo-6.11.0-1007-nvidia-64k" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-headers-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-headers-6.11.0-1007-nvidia-64k" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-64k" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-64k-dbgsym" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-dbgsym" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-modules-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-modules-6.11.0-1007-nvidia-64k" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-modules-extra-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-modules-extra-6.11.0-1007-nvidia-64k" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia-64k" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-nvidia-6.11-headers-6.11.0-1007" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-nvidia-6.11-lib-rust-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-nvidia-6.11-tools-6.11.0-1007" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-tools-6.11.0-1007-nvidia" }, { "binary_version": "6.11.0-1007.7", "binary_name": "linux-tools-6.11.0-1007-nvidia-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-dbgsym" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-modules-extra-6.8.0-1022-nvidia-lowlatency" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1022" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1022" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency" }, { "binary_version": "6.8.0-1022.25.2", "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.11.0-1015.15", "binary_name": "linux-buildinfo-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-headers-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-image-unsigned-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-image-unsigned-6.11.0-1015-oem-dbgsym" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-modules-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-modules-ipu6-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-modules-ipu7-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-modules-iwlwifi-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-modules-usbio-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-modules-vision-6.11.0-1015-oem" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-oem-6.11-headers-6.11.0-1015" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-oem-6.11-tools-6.11.0-1015" }, { "binary_version": "6.11.0-1015.15", "binary_name": "linux-tools-6.11.0-1015-oem" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1024.24", "binary_name": "linux-buildinfo-6.8.0-1024-oem" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-headers-6.8.0-1024-oem" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-image-unsigned-6.8.0-1024-oem" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-image-unsigned-6.8.0-1024-oem-dbgsym" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-modules-6.8.0-1024-oem" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-modules-ipu6-6.8.0-1024-oem" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-modules-iwlwifi-6.8.0-1024-oem" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-modules-usbio-6.8.0-1024-oem" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-oem-6.8-headers-6.8.0-1024" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-oem-6.8-tools-6.8.0-1024" }, { "binary_version": "6.8.0-1024.24", "binary_name": "linux-tools-6.8.0-1024-oem" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1020.21", "binary_name": "linux-buildinfo-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-headers-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-headers-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-modules-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-modules-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-modules-extra-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-oracle-headers-6.8.0-1020" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-oracle-tools-6.8.0-1020" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-tools-6.8.0-1020-oracle" }, { "binary_version": "6.8.0-1020.21", "binary_name": "linux-tools-6.8.0-1020-oracle-64k" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-1019.23", "binary_name": "linux-buildinfo-6.8.0-1019-raspi" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-headers-6.8.0-1019-raspi" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-image-6.8.0-1019-raspi" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-image-6.8.0-1019-raspi-dbgsym" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-modules-6.8.0-1019-raspi" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-raspi-headers-6.8.0-1019" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-raspi-tools-6.8.0-1019" }, { "binary_version": "6.8.0-1019.23", "binary_name": "linux-tools-6.8.0-1019-raspi" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-buildinfo-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-headers-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-image-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-image-6.8.0-53-generic-dbgsym" }, { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-modules-6.8.0-53-generic" }, { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-riscv-headers-6.8.0-53" }, { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-riscv-tools-6.8.0-53" }, { "binary_version": "6.8.0-53.55.1", "binary_name": "linux-tools-6.8.0-53-generic" } ], "availability": "No subscription required" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.0-2018.19", "binary_name": "linux-buildinfo-6.8.0-2018-raspi-realtime" }, { "binary_version": "6.8.0-2018.19", "binary_name": "linux-headers-6.8.0-2018-raspi-realtime" }, { "binary_version": "6.8.0-2018.19", "binary_name": "linux-image-6.8.0-2018-raspi-realtime" }, { "binary_version": "6.8.0-2018.19", "binary_name": "linux-image-6.8.0-2018-raspi-realtime-dbgsym" }, { "binary_version": "6.8.0-2018.19", "binary_name": "linux-modules-6.8.0-2018-raspi-realtime" }, { "binary_version": "6.8.0-2018.19", "binary_name": "linux-raspi-realtime-headers-6.8.0-2018" }, { "binary_version": "6.8.0-2018.19", "binary_name": "linux-raspi-realtime-tools-6.8.0-2018" }, { "binary_version": "6.8.0-2018.19", "binary_name": "linux-tools-6.8.0-2018-raspi-realtime" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service.", "binaries": [ { "binary_version": "6.8.1-1016.17", "binary_name": "linux-buildinfo-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-cloud-tools-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-headers-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-image-unsigned-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-image-unsigned-6.8.1-1016-realtime-dbgsym" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-modules-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-modules-extra-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-modules-iwlwifi-6.8.1-1016-realtime" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-realtime-cloud-tools-6.8.1-1016" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-realtime-headers-6.8.1-1016" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-realtime-tools-6.8.1-1016" }, { "binary_version": "6.8.1-1016.17", "binary_name": "linux-tools-6.8.1-1016-realtime" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }