In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdmaacceptnewconn() After the erdmacepput(newcep) being called, newcep will be freed, and the following dereference will cause a UAF problem. Fix this issue.
{ "binaries": [ { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-aws-6.8-headers-6.8.0-1031" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-aws-6.8-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-headers-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-headers-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k-dbgsym" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1031-aws-dbgsym" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-modules-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-modules-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-tools-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33~22.04.1", "binary_name": "linux-tools-6.8.0-1031-aws-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-azure-6.8-headers-6.8.0-1031" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-azure-6.8-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-headers-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1031-azure-dbgsym" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-modules-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-modules-involflt-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36~22.04.1", "binary_name": "linux-tools-6.8.0-1031-azure" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-gcp-6.8-headers-6.8.0-1032" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-gcp-6.8-tools-6.8.0-1032" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-headers-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-headers-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k-dbgsym" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-dbgsym" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-modules-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-modules-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-tools-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34~22.04.1", "binary_name": "linux-tools-6.8.0-1032-gcp-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-buildinfo-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-buildinfo-6.8.0-64-generic-64k" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-headers-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-headers-6.8.0-64-generic-64k" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-64" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-hwe-6.8-headers-6.8.0-64" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-hwe-6.8-tools-6.8.0-64" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-image-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-image-6.8.0-64-generic-dbgsym" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-64-generic-64k" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-64-generic-64k-dbgsym" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-64-generic-dbgsym" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-modules-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-modules-6.8.0-64-generic-64k" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-modules-extra-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-modules-ipu6-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-modules-usbio-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-tools-6.8.0-64-generic" }, { "binary_version": "6.8.0-64.67~22.04.1", "binary_name": "linux-tools-6.8.0-64-generic-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-headers-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-ibm-6.8-headers-6.8.0-1028" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-ibm-6.8-tools-6.8.0-1028" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1028-ibm-dbgsym" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-modules-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28~22.04.1", "binary_name": "linux-tools-6.8.0-1028-ibm" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-buildinfo-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-buildinfo-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-headers-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-headers-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-dbgsym" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-63" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-63" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-63" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-modules-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-modules-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-tools-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1~22.04.1", "binary_name": "linux-tools-6.8.0-63-lowlatency-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-headers-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-headers-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-dbgsym" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-modules-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-modules-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-nvidia-6.8-headers-6.8.0-1030" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-nvidia-6.8-tools-6.8.0-1030" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-tools-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33~22.04.1", "binary_name": "linux-tools-6.8.0-1030-nvidia-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-headers-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-headers-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-dbgsym" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-modules-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-modules-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-oracle-6.8-headers-6.8.0-1028" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-oracle-6.8-tools-6.8.0-1028" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-tools-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29~22.04.1", "binary_name": "linux-tools-6.8.0-1028-oracle-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-buildinfo-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-headers-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-image-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-image-6.8.0-63-generic-dbgsym" }, { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-modules-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-riscv-6.8-headers-6.8.0-63" }, { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-riscv-6.8-tools-6.8.0-63" }, { "binary_version": "6.8.0-63.66~22.04.1", "binary_name": "linux-tools-6.8.0-63-generic" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-63.66", "binary_name": "linux-bpf-dev" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-buildinfo-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-buildinfo-6.8.0-63-generic-64k" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-cloud-tools-6.8.0-63" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-cloud-tools-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-doc" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-headers-6.8.0-63" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-headers-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-headers-6.8.0-63-generic-64k" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-image-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-image-6.8.0-63-generic-dbgsym" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-image-unsigned-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-image-unsigned-6.8.0-63-generic-64k" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-image-unsigned-6.8.0-63-generic-64k-dbgsym" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-image-unsigned-6.8.0-63-generic-dbgsym" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-lib-rust-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-libc-dev" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-modules-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-modules-6.8.0-63-generic-64k" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-modules-extra-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-modules-ipu6-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-modules-iwlwifi-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-modules-usbio-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-source-6.8.0" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-tools-6.8.0-63" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-tools-6.8.0-63-generic" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-tools-6.8.0-63-generic-64k" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-tools-common" }, { "binary_version": "6.8.0-63.66", "binary_name": "linux-tools-host" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1031.33", "binary_name": "linux-aws-cloud-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-aws-headers-6.8.0-1031" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-aws-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-buildinfo-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-buildinfo-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-cloud-tools-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-cloud-tools-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-headers-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-headers-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-image-unsigned-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-image-unsigned-6.8.0-1031-aws-64k-dbgsym" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-image-unsigned-6.8.0-1031-aws-dbgsym" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-modules-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-modules-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-modules-extra-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-modules-extra-6.8.0-1031-aws-64k" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-tools-6.8.0-1031-aws" }, { "binary_version": "6.8.0-1031.33", "binary_name": "linux-tools-6.8.0-1031-aws-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1031.36", "binary_name": "linux-azure-cloud-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-azure-headers-6.8.0-1031" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-azure-tools-6.8.0-1031" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-buildinfo-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-cloud-tools-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-headers-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-image-unsigned-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-image-unsigned-6.8.0-1031-azure-dbgsym" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-modules-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-modules-extra-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-modules-involflt-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-modules-iwlwifi-6.8.0-1031-azure" }, { "binary_version": "6.8.0-1031.36", "binary_name": "linux-tools-6.8.0-1031-azure" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1018" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-azure-6.11-headers-6.11.0-1018" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-azure-6.11-tools-6.11.0-1018" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-buildinfo-6.11.0-1018-azure" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-cloud-tools-6.11.0-1018-azure" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-headers-6.11.0-1018-azure" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1018-azure" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1018-azure-dbgsym" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-modules-6.11.0-1018-azure" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-modules-extra-6.11.0-1018-azure" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-modules-iwlwifi-6.11.0-1018-azure" }, { "binary_version": "6.11.0-1018.18~24.04.1", "binary_name": "linux-tools-6.11.0-1018-azure" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1019.20", "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1019" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-azure-nvidia-cloud-tools-common" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-azure-nvidia-headers-6.8.0-1019" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-azure-nvidia-tools-6.8.0-1019" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-buildinfo-6.8.0-1019-azure-nvidia" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-cloud-tools-6.8.0-1019-azure-nvidia" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-headers-6.8.0-1019-azure-nvidia" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-image-unsigned-6.8.0-1019-azure-nvidia" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-image-unsigned-6.8.0-1019-azure-nvidia-dbgsym" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-modules-6.8.0-1019-azure-nvidia" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-modules-extra-6.8.0-1019-azure-nvidia" }, { "binary_version": "6.8.0-1019.20", "binary_name": "linux-tools-6.8.0-1019-azure-nvidia" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1032.34", "binary_name": "linux-buildinfo-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-buildinfo-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-gcp-headers-6.8.0-1032" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-gcp-tools-6.8.0-1032" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-headers-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-headers-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-64k-dbgsym" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-image-unsigned-6.8.0-1032-gcp-dbgsym" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-modules-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-modules-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-modules-extra-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-modules-extra-6.8.0-1032-gcp-64k" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-tools-6.8.0-1032-gcp" }, { "binary_version": "6.8.0-1032.34", "binary_name": "linux-tools-6.8.0-1032-gcp-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-buildinfo-6.11.0-1016-gcp" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-buildinfo-6.11.0-1016-gcp-64k" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-gcp-6.11-headers-6.11.0-1016" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1016-gcp" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-gcp-6.11-tools-6.11.0-1016" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-headers-6.11.0-1016-gcp" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-headers-6.11.0-1016-gcp-64k" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1016-gcp" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1016-gcp-64k" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1016-gcp-64k-dbgsym" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-1016-gcp-dbgsym" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-modules-6.11.0-1016-gcp" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-modules-6.11.0-1016-gcp-64k" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-modules-extra-6.11.0-1016-gcp" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-modules-extra-6.11.0-1016-gcp-64k" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-tools-6.11.0-1016-gcp" }, { "binary_version": "6.11.0-1016.16~24.04.1", "binary_name": "linux-tools-6.11.0-1016-gcp-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1027.31", "binary_name": "linux-buildinfo-6.8.0-1027-gke" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-gke-headers-6.8.0-1027" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-gke-tools-6.8.0-1027" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-headers-6.8.0-1027-gke" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-image-unsigned-6.8.0-1027-gke" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-image-unsigned-6.8.0-1027-gke-dbgsym" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-modules-6.8.0-1027-gke" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-modules-extra-6.8.0-1027-gke" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-modules-iwlwifi-6.8.0-1027-gke" }, { "binary_version": "6.8.0-1027.31", "binary_name": "linux-tools-6.8.0-1027-gke" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1014.16", "binary_name": "linux-buildinfo-6.8.0-1014-gkeop" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-cloud-tools-6.8.0-1014-gkeop" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-gkeop-cloud-tools-6.8.0-1014" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-gkeop-headers-6.8.0-1014" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-gkeop-tools-6.8.0-1014" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-headers-6.8.0-1014-gkeop" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-image-unsigned-6.8.0-1014-gkeop" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-image-unsigned-6.8.0-1014-gkeop-dbgsym" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-modules-6.8.0-1014-gkeop" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-modules-extra-6.8.0-1014-gkeop" }, { "binary_version": "6.8.0-1014.16", "binary_name": "linux-tools-6.8.0-1014-gkeop" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-buildinfo-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-buildinfo-6.11.0-28-generic-64k" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-cloud-tools-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-headers-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-headers-6.11.0-28-generic-64k" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-hwe-6.11-cloud-tools-6.11.0-28" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-hwe-6.11-headers-6.11.0-28" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-hwe-6.11-lib-rust-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-hwe-6.11-tools-6.11.0-28" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-image-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-image-6.11.0-28-generic-dbgsym" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-28-generic-64k" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-28-generic-64k-dbgsym" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-image-unsigned-6.11.0-28-generic-dbgsym" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-6.11.0-28-generic-64k" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-extra-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-ipu6-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-ipu7-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-iwlwifi-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-usbio-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-modules-vision-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-tools-6.11.0-28-generic" }, { "binary_version": "6.11.0-28.28~24.04.1", "binary_name": "linux-tools-6.11.0-28-generic-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1028.28", "binary_name": "linux-buildinfo-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-headers-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-ibm-headers-6.8.0-1028" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-ibm-tools-6.8.0-1028" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-image-unsigned-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-image-unsigned-6.8.0-1028-ibm-dbgsym" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-modules-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-modules-extra-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-modules-iwlwifi-6.8.0-1028-ibm" }, { "binary_version": "6.8.0-1028.28", "binary_name": "linux-tools-6.8.0-1028-ibm" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-buildinfo-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-buildinfo-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-cloud-tools-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-headers-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-headers-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-image-unsigned-6.8.0-63-lowlatency-dbgsym" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-lowlatency-cloud-tools-6.8.0-63" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-lowlatency-headers-6.8.0-63" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-lowlatency-lib-rust-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-lowlatency-tools-6.8.0-63" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-modules-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-modules-6.8.0-63-lowlatency-64k" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-modules-iwlwifi-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-tools-6.8.0-63-lowlatency" }, { "binary_version": "6.8.0-63.66.1", "binary_name": "linux-tools-6.8.0-63-lowlatency-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-buildinfo-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-buildinfo-6.11.0-1015-lowlatency-64k" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-cloud-tools-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-headers-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-headers-6.11.0-1015-lowlatency-64k" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency-64k" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency-64k-dbgsym" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-image-unsigned-6.11.0-1015-lowlatency-dbgsym" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1015" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-lowlatency-hwe-6.11-headers-6.11.0-1015" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-lowlatency-hwe-6.11-tools-6.11.0-1015" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-modules-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-modules-6.11.0-1015-lowlatency-64k" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-modules-iwlwifi-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-tools-6.11.0-1015-lowlatency" }, { "binary_version": "6.11.0-1015.16~24.04.2", "binary_name": "linux-tools-6.11.0-1015-lowlatency-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1030.33", "binary_name": "linux-buildinfo-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-headers-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-headers-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-dbgsym" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-modules-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-modules-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-modules-extra-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-64k" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-nvidia-headers-6.8.0-1030" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-nvidia-tools-6.8.0-1030" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-tools-6.8.0-1030-nvidia" }, { "binary_version": "6.8.0-1030.33", "binary_name": "linux-tools-6.8.0-1030-nvidia-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.11.0-1012.12", "binary_name": "linux-buildinfo-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-buildinfo-6.11.0-1012-nvidia-64k" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-headers-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-headers-6.11.0-1012-nvidia-64k" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-image-unsigned-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-image-unsigned-6.11.0-1012-nvidia-64k" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-image-unsigned-6.11.0-1012-nvidia-64k-dbgsym" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-image-unsigned-6.11.0-1012-nvidia-dbgsym" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-modules-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-modules-6.11.0-1012-nvidia-64k" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-modules-extra-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-modules-extra-6.11.0-1012-nvidia-64k" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-modules-nvidia-fs-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-modules-nvidia-fs-6.11.0-1012-nvidia-64k" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-nvidia-6.11-headers-6.11.0-1012" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-nvidia-6.11-lib-rust-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-nvidia-6.11-tools-6.11.0-1012" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-tools-6.11.0-1012-nvidia" }, { "binary_version": "6.11.0-1012.12", "binary_name": "linux-tools-6.11.0-1012-nvidia-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-lowlatency" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-buildinfo-6.8.0-1030-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-headers-6.8.0-1030-nvidia-lowlatency" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-headers-6.8.0-1030-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-image-unsigned-6.8.0-1030-nvidia-lowlatency-dbgsym" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-modules-6.8.0-1030-nvidia-lowlatency" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-modules-6.8.0-1030-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-modules-extra-6.8.0-1030-nvidia-lowlatency" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-lowlatency" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1030-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1030" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1030" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-tools-6.8.0-1030-nvidia-lowlatency" }, { "binary_version": "6.8.0-1030.33.1", "binary_name": "linux-tools-6.8.0-1030-nvidia-lowlatency-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.11.0-1024.24", "binary_name": "linux-buildinfo-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-headers-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-image-unsigned-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-image-unsigned-6.11.0-1024-oem-dbgsym" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-modules-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-modules-ipu6-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-modules-ipu7-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-modules-iwlwifi-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-modules-usbio-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-modules-vision-6.11.0-1024-oem" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-oem-6.11-headers-6.11.0-1024" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-oem-6.11-tools-6.11.0-1024" }, { "binary_version": "6.11.0-1024.24", "binary_name": "linux-tools-6.11.0-1024-oem" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1030.30", "binary_name": "linux-buildinfo-6.8.0-1030-oem" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-headers-6.8.0-1030-oem" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-image-unsigned-6.8.0-1030-oem" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-image-unsigned-6.8.0-1030-oem-dbgsym" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-modules-6.8.0-1030-oem" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-modules-ipu6-6.8.0-1030-oem" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-modules-iwlwifi-6.8.0-1030-oem" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-modules-usbio-6.8.0-1030-oem" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-oem-6.8-headers-6.8.0-1030" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-oem-6.8-tools-6.8.0-1030" }, { "binary_version": "6.8.0-1030.30", "binary_name": "linux-tools-6.8.0-1030-oem" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1028.29", "binary_name": "linux-buildinfo-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-buildinfo-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-headers-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-headers-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-image-unsigned-6.8.0-1028-oracle-dbgsym" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-modules-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-modules-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-modules-extra-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-modules-extra-6.8.0-1028-oracle-64k" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-oracle-headers-6.8.0-1028" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-oracle-tools-6.8.0-1028" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-tools-6.8.0-1028-oracle" }, { "binary_version": "6.8.0-1028.29", "binary_name": "linux-tools-6.8.0-1028-oracle-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-1030.34", "binary_name": "linux-buildinfo-6.8.0-1030-raspi" }, { "binary_version": "6.8.0-1030.34", "binary_name": "linux-headers-6.8.0-1030-raspi" }, { "binary_version": "6.8.0-1030.34", "binary_name": "linux-image-6.8.0-1030-raspi" }, { "binary_version": "6.8.0-1030.34", "binary_name": "linux-image-6.8.0-1030-raspi-dbgsym" }, { "binary_version": "6.8.0-1030.34", "binary_name": "linux-modules-6.8.0-1030-raspi" }, { "binary_version": "6.8.0-1030.34", "binary_name": "linux-raspi-headers-6.8.0-1030" }, { "binary_version": "6.8.0-1030.34", "binary_name": "linux-raspi-tools-6.8.0-1030" }, { "binary_version": "6.8.0-1030.34", "binary_name": "linux-tools-6.8.0-1030-raspi" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-2025.26", "binary_name": "linux-buildinfo-6.8.0-2025-raspi-realtime" }, { "binary_version": "6.8.0-2025.26", "binary_name": "linux-headers-6.8.0-2025-raspi-realtime" }, { "binary_version": "6.8.0-2025.26", "binary_name": "linux-image-6.8.0-2025-raspi-realtime" }, { "binary_version": "6.8.0-2025.26", "binary_name": "linux-image-6.8.0-2025-raspi-realtime-dbgsym" }, { "binary_version": "6.8.0-2025.26", "binary_name": "linux-modules-6.8.0-2025-raspi-realtime" }, { "binary_version": "6.8.0-2025.26", "binary_name": "linux-raspi-realtime-headers-6.8.0-2025" }, { "binary_version": "6.8.0-2025.26", "binary_name": "linux-raspi-realtime-tools-6.8.0-2025" }, { "binary_version": "6.8.0-2025.26", "binary_name": "linux-tools-6.8.0-2025-raspi-realtime" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_version": "6.8.1-1024.25", "binary_name": "linux-buildinfo-6.8.1-1024-realtime" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-cloud-tools-6.8.1-1024-realtime" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-headers-6.8.1-1024-realtime" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-image-unsigned-6.8.1-1024-realtime" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-image-unsigned-6.8.1-1024-realtime-dbgsym" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-modules-6.8.1-1024-realtime" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-modules-extra-6.8.1-1024-realtime" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-modules-iwlwifi-6.8.1-1024-realtime" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-realtime-cloud-tools-6.8.1-1024" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-realtime-headers-6.8.1-1024" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-realtime-tools-6.8.1-1024" }, { "binary_version": "6.8.1-1024.25", "binary_name": "linux-tools-6.8.1-1024-realtime" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_version": "7.6.0+6.14.0-22.22", "binary_name": "bpftool" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-bpf-dev" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-buildinfo-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-buildinfo-6.14.0-22-generic-64k" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-cloud-tools-6.14.0-22" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-cloud-tools-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-doc" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-headers-6.14.0-22" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-headers-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-headers-6.14.0-22-generic-64k" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-image-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-image-6.14.0-22-generic-dbgsym" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-image-unsigned-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-image-unsigned-6.14.0-22-generic-64k" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-image-unsigned-6.14.0-22-generic-64k-dbgsym" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-image-unsigned-6.14.0-22-generic-dbgsym" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-lib-rust-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-libc-dev" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-6.14.0-22-generic-64k" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-extra-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-ipu6-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-ipu7-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-iwlwifi-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-usbio-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-modules-vision-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-perf" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-source-6.14.0" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-tools-6.14.0-22" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-tools-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-tools-6.14.0-22-generic-64k" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-tools-common" }, { "binary_version": "6.14.0-22.22", "binary_name": "linux-tools-host" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.14.0-1007.7", "binary_name": "linux-aws-cloud-tools-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-aws-headers-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-aws-tools-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-buildinfo-6.14.0-1007-aws" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-buildinfo-6.14.0-1007-aws-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-cloud-tools-6.14.0-1007-aws" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-cloud-tools-6.14.0-1007-aws-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-headers-6.14.0-1007-aws" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-headers-6.14.0-1007-aws-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-aws" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-aws-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-aws-64k-dbgsym" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-aws-dbgsym" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-6.14.0-1007-aws" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-6.14.0-1007-aws-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-extra-6.14.0-1007-aws" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-extra-6.14.0-1007-aws-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-tools-6.14.0-1007-aws" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-tools-6.14.0-1007-aws-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.14.0-1007.7", "binary_name": "linux-azure-cloud-tools-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-azure-headers-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-azure-tools-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-buildinfo-6.14.0-1007-azure" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-cloud-tools-6.14.0-1007-azure" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-headers-6.14.0-1007-azure" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-azure" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-azure-dbgsym" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-6.14.0-1007-azure" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-extra-6.14.0-1007-azure" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-tools-6.14.0-1007-azure" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.14.0-1008.8", "binary_name": "linux-buildinfo-6.14.0-1008-gcp" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-buildinfo-6.14.0-1008-gcp-64k" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-gcp-headers-6.14.0-1008" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-gcp-tools-6.14.0-1008" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-headers-6.14.0-1008-gcp" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-headers-6.14.0-1008-gcp-64k" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-image-unsigned-6.14.0-1008-gcp" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-image-unsigned-6.14.0-1008-gcp-64k" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-image-unsigned-6.14.0-1008-gcp-64k-dbgsym" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-image-unsigned-6.14.0-1008-gcp-dbgsym" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-modules-6.14.0-1008-gcp" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-modules-6.14.0-1008-gcp-64k" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-modules-extra-6.14.0-1008-gcp" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-modules-extra-6.14.0-1008-gcp-64k" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-tools-6.14.0-1008-gcp" }, { "binary_version": "6.14.0-1008.8", "binary_name": "linux-tools-6.14.0-1008-gcp-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.14.0-1007.7", "binary_name": "linux-buildinfo-6.14.0-1007-oracle" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-buildinfo-6.14.0-1007-oracle-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-headers-6.14.0-1007-oracle" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-headers-6.14.0-1007-oracle-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-oracle" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-oracle-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-oracle-64k-dbgsym" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-unsigned-6.14.0-1007-oracle-dbgsym" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-6.14.0-1007-oracle" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-6.14.0-1007-oracle-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-extra-6.14.0-1007-oracle" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-extra-6.14.0-1007-oracle-64k" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-oracle-headers-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-oracle-tools-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-tools-6.14.0-1007-oracle" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-tools-6.14.0-1007-oracle-64k" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.14.0-1007.7", "binary_name": "linux-buildinfo-6.14.0-1007-raspi" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-headers-6.14.0-1007-raspi" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-6.14.0-1007-raspi" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-image-6.14.0-1007-raspi-dbgsym" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-modules-6.14.0-1007-raspi" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-raspi-headers-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-raspi-tools-6.14.0-1007" }, { "binary_version": "6.14.0-1007.7", "binary_name": "linux-tools-6.14.0-1007-raspi" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.14.0-1004.4", "binary_name": "linux-buildinfo-6.14.0-1004-realtime" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-cloud-tools-6.14.0-1004-realtime" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-headers-6.14.0-1004-realtime" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-image-unsigned-6.14.0-1004-realtime" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-image-unsigned-6.14.0-1004-realtime-dbgsym" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-modules-6.14.0-1004-realtime" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-modules-extra-6.14.0-1004-realtime" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-modules-iwlwifi-6.14.0-1004-realtime" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-realtime-cloud-tools-6.14.0-1004" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-realtime-headers-6.14.0-1004" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-realtime-tools-6.14.0-1004" }, { "binary_version": "6.14.0-1004.4", "binary_name": "linux-tools-6.14.0-1004-realtime" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-buildinfo-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-headers-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-image-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-image-6.14.0-22-generic-dbgsym" }, { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-modules-6.14.0-22-generic" }, { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-riscv-headers-6.14.0-22" }, { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-riscv-tools-6.14.0-22" }, { "binary_version": "6.14.0-22.22.1", "binary_name": "linux-tools-6.14.0-22-generic" } ], "priority_reason": "This CVE is potentially remote and could lead to DoS - change priority to high.", "availability": "No subscription required" }