It was discovered that the Serial CAN interface driver in the Linux kernel did not properly initialize data. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-11494)
{ "module_name_regex": "lkp_Ubuntu_4_4_0[_|\\d]+_aws_(\\d+)", "module_version": "67", "availability": "Livepatch subscription required" }
{ "module_name_regex": "lkp_Ubuntu_4_4_0[_|\\d]+_(?:generic|lowlatency)_(\\d+)", "module_version": "67", "availability": "Livepatch subscription required" }
{ "module_name_regex": "lkp_Ubuntu_4_15_0[_|\\d]+_aws_(\\d+)", "module_version": "67", "availability": "Livepatch subscription required" }
{ "module_name_regex": "lkp_Ubuntu_5_0_0[_|\\d]+_azure_(\\d+)", "module_version": "67", "availability": "Livepatch subscription required" }
{ "module_name_regex": "lkp_Ubuntu_5_0_0[_|\\d]+_gcp_(\\d+)", "module_version": "67", "availability": "Livepatch subscription required" }
{ "module_name_regex": "lkp_Ubuntu_4_15_0[_|\\d]+_(?:generic|lowlatency)_(\\d+)", "module_version": "67", "availability": "Livepatch subscription required" }
{ "module_name_regex": "lkp_Ubuntu_4_15_0[_|\\d]+_oem_(\\d+)", "module_version": "67", "availability": "Livepatch subscription required" }