In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdmaacceptnewconn() After the erdmacepput(newcep) being called, newcep will be freed, and the following dereference will cause a UAF problem. Fix this issue.
{ "binaries": [ { "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1031", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-aws-6.8-headers-6.8.0-1031", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-aws-6.8-tools-6.8.0-1031", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k-dbgsym", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws-dbgsym", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1031", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-azure-6.8-headers-6.8.0-1031", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-azure-6.8-tools-6.8.0-1031", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-azure-dbgsym", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-modules-involflt-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-gcp-6.8-headers-6.8.0-1032", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-gcp-6.8-tools-6.8.0-1032", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k-dbgsym", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-dbgsym", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-64-generic-64k", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-headers-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-headers-6.8.0-64-generic-64k", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-64", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-hwe-6.8-headers-6.8.0-64", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-hwe-6.8-tools-6.8.0-64", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-image-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-image-6.8.0-64-generic-dbgsym", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-64-generic-64k", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-64-generic-64k-dbgsym", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-64-generic-dbgsym", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-modules-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-modules-6.8.0-64-generic-64k", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-modules-ipu6-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-modules-usbio-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-tools-6.8.0-64-generic", "binary_version": "6.8.0-64.67~22.04.1" }, { "binary_name": "linux-tools-6.8.0-64-generic-64k", "binary_version": "6.8.0-64.67~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-ibm-6.8-headers-6.8.0-1028", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-ibm-6.8-tools-6.8.0-1028", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-ibm-dbgsym", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k-dbgsym", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-dbgsym", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-63", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-63", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-63", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k-dbgsym", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-dbgsym", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-nvidia-6.8-headers-6.8.0-1030", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-nvidia-6.8-tools-6.8.0-1030", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k-dbgsym", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-dbgsym", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-oracle-6.8-headers-6.8.0-1028", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-oracle-6.8-tools-6.8.0-1028", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-63-generic", "binary_version": "6.8.0-63.66~22.04.1" }, { "binary_name": "linux-headers-6.8.0-63-generic", "binary_version": "6.8.0-63.66~22.04.1" }, { "binary_name": "linux-image-6.8.0-63-generic", "binary_version": "6.8.0-63.66~22.04.1" }, { "binary_name": "linux-image-6.8.0-63-generic-dbgsym", "binary_version": "6.8.0-63.66~22.04.1" }, { "binary_name": "linux-modules-6.8.0-63-generic", "binary_version": "6.8.0-63.66~22.04.1" }, { "binary_name": "linux-riscv-6.8-headers-6.8.0-63", "binary_version": "6.8.0-63.66~22.04.1" }, { "binary_name": "linux-riscv-6.8-tools-6.8.0-63", "binary_version": "6.8.0-63.66~22.04.1" }, { "binary_name": "linux-tools-6.8.0-63-generic", "binary_version": "6.8.0-63.66~22.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-buildinfo-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-buildinfo-6.8.0-63-generic-64k", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-cloud-tools-6.8.0-63", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-cloud-tools-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-doc", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-headers-6.8.0-63", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-headers-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-headers-6.8.0-63-generic-64k", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-image-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-image-6.8.0-63-generic-dbgsym", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-image-unsigned-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-image-unsigned-6.8.0-63-generic-64k", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-image-unsigned-6.8.0-63-generic-64k-dbgsym", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-image-unsigned-6.8.0-63-generic-dbgsym", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-lib-rust-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-libc-dev", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-modules-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-modules-6.8.0-63-generic-64k", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-modules-extra-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-modules-ipu6-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-modules-usbio-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-source-6.8.0", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-tools-6.8.0-63", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-tools-6.8.0-63-generic", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-tools-6.8.0-63-generic-64k", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-tools-common", "binary_version": "6.8.0-63.66" }, { "binary_name": "linux-tools-host", "binary_version": "6.8.0-63.66" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.8.0-1031", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-aws-headers-6.8.0-1031", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-aws-tools-6.8.0-1031", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-buildinfo-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-buildinfo-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-cloud-tools-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-cloud-tools-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-headers-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-headers-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k-dbgsym", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-aws-dbgsym", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-modules-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-modules-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-modules-extra-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-modules-extra-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-tools-6.8.0-1031-aws", "binary_version": "6.8.0-1031.33" }, { "binary_name": "linux-tools-6.8.0-1031-aws-64k", "binary_version": "6.8.0-1031.33" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.8.0-1031", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-azure-headers-6.8.0-1031", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-azure-tools-6.8.0-1031", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-buildinfo-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-cloud-tools-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-headers-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-image-unsigned-6.8.0-1031-azure-dbgsym", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-modules-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-modules-extra-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-modules-involflt-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" }, { "binary_name": "linux-tools-6.8.0-1031-azure", "binary_version": "6.8.0-1031.36" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1018", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-azure-6.11-headers-6.11.0-1018", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-azure-6.11-tools-6.11.0-1018", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1018-azure-dbgsym", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1018-azure", "binary_version": "6.11.0-1018.18~24.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1019", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-azure-nvidia-cloud-tools-common", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-azure-nvidia-headers-6.8.0-1019", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-azure-nvidia-tools-6.8.0-1019", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-buildinfo-6.8.0-1019-azure-nvidia", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-cloud-tools-6.8.0-1019-azure-nvidia", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-headers-6.8.0-1019-azure-nvidia", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-azure-nvidia", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-azure-nvidia-dbgsym", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-modules-6.8.0-1019-azure-nvidia", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-modules-extra-6.8.0-1019-azure-nvidia", "binary_version": "6.8.0-1019.20" }, { "binary_name": "linux-tools-6.8.0-1019-azure-nvidia", "binary_version": "6.8.0-1019.20" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-buildinfo-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-gcp-headers-6.8.0-1032", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-gcp-tools-6.8.0-1032", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-headers-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-headers-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k-dbgsym", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-dbgsym", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-modules-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-modules-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-modules-extra-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-modules-extra-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-tools-6.8.0-1032-gcp", "binary_version": "6.8.0-1032.34" }, { "binary_name": "linux-tools-6.8.0-1032-gcp-64k", "binary_version": "6.8.0-1032.34" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1016-gcp", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1016-gcp-64k", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-gcp-6.11-headers-6.11.0-1016", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1016-gcp", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-gcp-6.11-tools-6.11.0-1016", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1016-gcp", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1016-gcp-64k", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1016-gcp", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1016-gcp-64k", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1016-gcp-64k-dbgsym", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1016-gcp-dbgsym", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1016-gcp", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1016-gcp-64k", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1016-gcp", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1016-gcp-64k", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1016-gcp", "binary_version": "6.11.0-1016.16~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1016-gcp-64k", "binary_version": "6.11.0-1016.16~24.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1027-gke", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-gke-headers-6.8.0-1027", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-gke-tools-6.8.0-1027", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-headers-6.8.0-1027-gke", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-gke", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-gke-dbgsym", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-modules-6.8.0-1027-gke", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-modules-extra-6.8.0-1027-gke", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1027-gke", "binary_version": "6.8.0-1027.31" }, { "binary_name": "linux-tools-6.8.0-1027-gke", "binary_version": "6.8.0-1027.31" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1014-gkeop", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-cloud-tools-6.8.0-1014-gkeop", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-gkeop-cloud-tools-6.8.0-1014", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-gkeop-headers-6.8.0-1014", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-gkeop-tools-6.8.0-1014", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-headers-6.8.0-1014-gkeop", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-gkeop", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-gkeop-dbgsym", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-modules-6.8.0-1014-gkeop", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-modules-extra-6.8.0-1014-gkeop", "binary_version": "6.8.0-1014.16" }, { "binary_name": "linux-tools-6.8.0-1014-gkeop", "binary_version": "6.8.0-1014.16" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-28-generic-64k", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-headers-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-headers-6.11.0-28-generic-64k", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-hwe-6.11-cloud-tools-6.11.0-28", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-hwe-6.11-headers-6.11.0-28", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-hwe-6.11-lib-rust-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-hwe-6.11-tools-6.11.0-28", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-image-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-image-6.11.0-28-generic-dbgsym", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-28-generic-64k", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-28-generic-64k-dbgsym", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-28-generic-dbgsym", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-6.11.0-28-generic-64k", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-ipu6-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-ipu7-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-usbio-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-modules-vision-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-tools-6.11.0-28-generic", "binary_version": "6.11.0-28.28~24.04.1" }, { "binary_name": "linux-tools-6.11.0-28-generic-64k", "binary_version": "6.11.0-28.28~24.04.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-headers-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-ibm-headers-6.8.0-1028", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-ibm-tools-6.8.0-1028", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-ibm-dbgsym", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-modules-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-modules-extra-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28" }, { "binary_name": "linux-tools-6.8.0-1028-ibm", "binary_version": "6.8.0-1028.28" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-buildinfo-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-cloud-tools-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-headers-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-headers-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k-dbgsym", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-dbgsym", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-lowlatency-cloud-tools-6.8.0-63", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-lowlatency-headers-6.8.0-63", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-lowlatency-lib-rust-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-lowlatency-tools-6.8.0-63", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-modules-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-modules-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-tools-6.8.0-63-lowlatency", "binary_version": "6.8.0-63.66.1" }, { "binary_name": "linux-tools-6.8.0-63-lowlatency-64k", "binary_version": "6.8.0-63.66.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-buildinfo-6.11.0-1015-lowlatency-64k", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-cloud-tools-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-headers-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-headers-6.11.0-1015-lowlatency-64k", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency-64k", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency-64k-dbgsym", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency-dbgsym", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1015", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.11-headers-6.11.0-1015", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-lowlatency-hwe-6.11-tools-6.11.0-1015", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-modules-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-modules-6.11.0-1015-lowlatency-64k", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-tools-6.11.0-1015-lowlatency", "binary_version": "6.11.0-1015.16~24.04.2" }, { "binary_name": "linux-tools-6.11.0-1015-lowlatency-64k", "binary_version": "6.11.0-1015.16~24.04.2" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-headers-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-headers-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k-dbgsym", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-dbgsym", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-modules-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-modules-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-modules-extra-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-nvidia-headers-6.8.0-1030", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-nvidia-tools-6.8.0-1030", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-tools-6.8.0-1030-nvidia", "binary_version": "6.8.0-1030.33" }, { "binary_name": "linux-tools-6.8.0-1030-nvidia-64k", "binary_version": "6.8.0-1030.33" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-lowlatency", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-lowlatency-64k", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-headers-6.8.0-1030-nvidia-lowlatency", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-headers-6.8.0-1030-nvidia-lowlatency-64k", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency-64k", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency-64k-dbgsym", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency-dbgsym", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-modules-6.8.0-1030-nvidia-lowlatency", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-modules-6.8.0-1030-nvidia-lowlatency-64k", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-modules-extra-6.8.0-1030-nvidia-lowlatency", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-lowlatency", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-lowlatency-64k", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1030", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1030", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-tools-6.8.0-1030-nvidia-lowlatency", "binary_version": "6.8.0-1030.33.1" }, { "binary_name": "linux-tools-6.8.0-1030-nvidia-lowlatency-64k", "binary_version": "6.8.0-1030.33.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-headers-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.11.0-1024-oem-dbgsym", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-modules-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-modules-ipu6-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-modules-ipu7-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-modules-usbio-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-modules-vision-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-oem-6.11-headers-6.11.0-1024", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-oem-6.11-tools-6.11.0-1024", "binary_version": "6.11.0-1024.24" }, { "binary_name": "linux-tools-6.11.0-1024-oem", "binary_version": "6.11.0-1024.24" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-headers-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1030-oem-dbgsym", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-modules-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-modules-ipu6-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-modules-usbio-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-oem-6.8-headers-6.8.0-1030", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-oem-6.8-tools-6.8.0-1030", "binary_version": "6.8.0-1030.30" }, { "binary_name": "linux-tools-6.8.0-1030-oem", "binary_version": "6.8.0-1030.30" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-buildinfo-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-headers-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-headers-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k-dbgsym", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-dbgsym", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-modules-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-modules-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-modules-extra-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-modules-extra-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-oracle-headers-6.8.0-1028", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-oracle-tools-6.8.0-1028", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-tools-6.8.0-1028-oracle", "binary_version": "6.8.0-1028.29" }, { "binary_name": "linux-tools-6.8.0-1028-oracle-64k", "binary_version": "6.8.0-1028.29" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1030-raspi", "binary_version": "6.8.0-1030.34" }, { "binary_name": "linux-headers-6.8.0-1030-raspi", "binary_version": "6.8.0-1030.34" }, { "binary_name": "linux-image-6.8.0-1030-raspi", "binary_version": "6.8.0-1030.34" }, { "binary_name": "linux-image-6.8.0-1030-raspi-dbgsym", "binary_version": "6.8.0-1030.34" }, { "binary_name": "linux-modules-6.8.0-1030-raspi", "binary_version": "6.8.0-1030.34" }, { "binary_name": "linux-raspi-headers-6.8.0-1030", "binary_version": "6.8.0-1030.34" }, { "binary_name": "linux-raspi-tools-6.8.0-1030", "binary_version": "6.8.0-1030.34" }, { "binary_name": "linux-tools-6.8.0-1030-raspi", "binary_version": "6.8.0-1030.34" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-2025-raspi-realtime", "binary_version": "6.8.0-2025.26" }, { "binary_name": "linux-headers-6.8.0-2025-raspi-realtime", "binary_version": "6.8.0-2025.26" }, { "binary_name": "linux-image-6.8.0-2025-raspi-realtime", "binary_version": "6.8.0-2025.26" }, { "binary_name": "linux-image-6.8.0-2025-raspi-realtime-dbgsym", "binary_version": "6.8.0-2025.26" }, { "binary_name": "linux-modules-6.8.0-2025-raspi-realtime", "binary_version": "6.8.0-2025.26" }, { "binary_name": "linux-raspi-realtime-headers-6.8.0-2025", "binary_version": "6.8.0-2025.26" }, { "binary_name": "linux-raspi-realtime-tools-6.8.0-2025", "binary_version": "6.8.0-2025.26" }, { "binary_name": "linux-tools-6.8.0-2025-raspi-realtime", "binary_version": "6.8.0-2025.26" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-cloud-tools-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-headers-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-image-unsigned-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-image-unsigned-6.8.1-1024-realtime-dbgsym", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-modules-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-modules-extra-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-modules-iwlwifi-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-realtime-cloud-tools-6.8.1-1024", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-realtime-headers-6.8.1-1024", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-realtime-tools-6.8.1-1024", "binary_version": "6.8.1-1024.25" }, { "binary_name": "linux-tools-6.8.1-1024-realtime", "binary_version": "6.8.1-1024.25" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "bpftool", "binary_version": "7.6.0+6.14.0-22.22" }, { "binary_name": "linux-bpf-dev", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-buildinfo-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-buildinfo-6.14.0-22-generic-64k", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-cloud-tools-6.14.0-22", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-cloud-tools-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-doc", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-headers-6.14.0-22", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-headers-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-headers-6.14.0-22-generic-64k", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-image-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-image-6.14.0-22-generic-dbgsym", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-image-unsigned-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-image-unsigned-6.14.0-22-generic-64k", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-image-unsigned-6.14.0-22-generic-64k-dbgsym", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-image-unsigned-6.14.0-22-generic-dbgsym", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-lib-rust-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-libc-dev", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-6.14.0-22-generic-64k", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-extra-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-ipu6-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-ipu7-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-iwlwifi-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-usbio-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-modules-vision-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-perf", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-source-6.14.0", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-tools-6.14.0-22", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-tools-6.14.0-22-generic", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-tools-6.14.0-22-generic-64k", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-tools-common", "binary_version": "6.14.0-22.22" }, { "binary_name": "linux-tools-host", "binary_version": "6.14.0-22.22" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-aws-headers-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-aws-tools-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-buildinfo-6.14.0-1007-aws", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-buildinfo-6.14.0-1007-aws-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-cloud-tools-6.14.0-1007-aws", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-cloud-tools-6.14.0-1007-aws-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-headers-6.14.0-1007-aws", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-headers-6.14.0-1007-aws-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-aws", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-aws-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-aws-64k-dbgsym", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-aws-dbgsym", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-6.14.0-1007-aws", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-6.14.0-1007-aws-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-extra-6.14.0-1007-aws", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-extra-6.14.0-1007-aws-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-tools-6.14.0-1007-aws", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-tools-6.14.0-1007-aws-64k", "binary_version": "6.14.0-1007.7" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-azure-headers-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-azure-tools-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-buildinfo-6.14.0-1007-azure", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-cloud-tools-6.14.0-1007-azure", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-headers-6.14.0-1007-azure", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-azure", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-azure-dbgsym", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-6.14.0-1007-azure", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-extra-6.14.0-1007-azure", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-tools-6.14.0-1007-azure", "binary_version": "6.14.0-1007.7" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1008-gcp", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-buildinfo-6.14.0-1008-gcp-64k", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-gcp-headers-6.14.0-1008", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-gcp-tools-6.14.0-1008", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-headers-6.14.0-1008-gcp", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-headers-6.14.0-1008-gcp-64k", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.14.0-1008-gcp", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.14.0-1008-gcp-64k", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.14.0-1008-gcp-64k-dbgsym", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-image-unsigned-6.14.0-1008-gcp-dbgsym", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-modules-6.14.0-1008-gcp", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-modules-6.14.0-1008-gcp-64k", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-modules-extra-6.14.0-1008-gcp", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-modules-extra-6.14.0-1008-gcp-64k", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-tools-6.14.0-1008-gcp", "binary_version": "6.14.0-1008.8" }, { "binary_name": "linux-tools-6.14.0-1008-gcp-64k", "binary_version": "6.14.0-1008.8" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1007-oracle", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-buildinfo-6.14.0-1007-oracle-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-headers-6.14.0-1007-oracle", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-headers-6.14.0-1007-oracle-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-oracle", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-oracle-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-oracle-64k-dbgsym", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.14.0-1007-oracle-dbgsym", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-6.14.0-1007-oracle", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-6.14.0-1007-oracle-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-extra-6.14.0-1007-oracle", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-extra-6.14.0-1007-oracle-64k", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-oracle-headers-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-oracle-tools-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-tools-6.14.0-1007-oracle", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-tools-6.14.0-1007-oracle-64k", "binary_version": "6.14.0-1007.7" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1007-raspi", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-headers-6.14.0-1007-raspi", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-6.14.0-1007-raspi", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-image-6.14.0-1007-raspi-dbgsym", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-modules-6.14.0-1007-raspi", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-raspi-headers-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-raspi-tools-6.14.0-1007", "binary_version": "6.14.0-1007.7" }, { "binary_name": "linux-tools-6.14.0-1007-raspi", "binary_version": "6.14.0-1007.7" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-cloud-tools-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-headers-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-image-unsigned-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-image-unsigned-6.14.0-1004-realtime-dbgsym", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-modules-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-modules-extra-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-modules-iwlwifi-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-realtime-cloud-tools-6.14.0-1004", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-realtime-headers-6.14.0-1004", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-realtime-tools-6.14.0-1004", "binary_version": "6.14.0-1004.4" }, { "binary_name": "linux-tools-6.14.0-1004-realtime", "binary_version": "6.14.0-1004.4" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1" }, { "binary_name": "linux-headers-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1" }, { "binary_name": "linux-image-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1" }, { "binary_name": "linux-image-6.14.0-22-generic-dbgsym", "binary_version": "6.14.0-22.22.1" }, { "binary_name": "linux-modules-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1" }, { "binary_name": "linux-riscv-headers-6.14.0-22", "binary_version": "6.14.0-22.22.1" }, { "binary_name": "linux-riscv-tools-6.14.0-22", "binary_version": "6.14.0-22.22.1" }, { "binary_name": "linux-tools-6.14.0-22-generic", "binary_version": "6.14.0-22.22.1" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }