A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perfgroupdetach function did not check the event's siblings' attachstate before calling addeventtogroups(), but removeonexec made it possible to call listdelevent() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "3.11.0-12.19", "binary_name": "block-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "block-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "crypto-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "crypto-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fat-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fat-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fb-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "firewire-core-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "floppy-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-core-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-core-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-secondary-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-secondary-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "input-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "input-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ipmi-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ipmi-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "irda-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "irda-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "kernel-image-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "kernel-image-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-doc" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-headers-3.11.0-12" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-headers-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-headers-3.11.0-12-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-image-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-image-3.11.0-12-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-image-extra-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-libc-dev" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-source-3.11.0" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-3.11.0-12" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-3.11.0-12-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-common" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-udebs-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "md-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "md-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "message-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "mouse-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "mouse-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "multipath-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "multipath-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nfs-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nfs-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-pcmcia-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-shared-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-shared-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-usb-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-usb-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "parport-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "parport-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "pata-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "pcmcia-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "pcmcia-storage-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "plip-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "plip-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ppp-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ppp-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "sata-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "sata-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "scsi-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "scsi-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "serial-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "speakup-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "speakup-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "squashfs-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "squashfs-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "storage-core-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "storage-core-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "usb-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "usb-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "virtio-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "vlan-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "vlan-modules-3.11.0-12-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-1002.2", "binary_name": "linux-aws-cloud-tools-4.4.0-1002" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-aws-cloud-tools-4.4.0-1002-dbgsym" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-aws-headers-4.4.0-1002" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-aws-tools-4.4.0-1002" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-aws-tools-4.4.0-1002-dbgsym" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-cloud-tools-4.4.0-1002-aws" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-headers-4.4.0-1002-aws" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-image-4.4.0-1002-aws" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-image-4.4.0-1002-aws-dbgsym" }, { "binary_version": "4.4.0-1002.2", "binary_name": "linux-tools-4.4.0-1002-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1023" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1023-dbgsym" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-azure-headers-4.15.0-1023" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-azure-tools-4.15.0-1023" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-azure-tools-4.15.0-1023-dbgsym" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-cloud-tools-4.15.0-1023-azure" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-headers-4.15.0-1023-azure" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1023-azure" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1023-azure-dbgsym" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-modules-4.15.0-1023-azure" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-modules-extra-4.15.0-1023-azure" }, { "binary_version": "4.15.0-1023.24~14.04.1", "binary_name": "linux-tools-4.15.0-1023-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "block-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "block-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "block-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "block-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "block-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "crypto-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "crypto-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "crypto-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "crypto-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "crypto-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fat-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fat-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fat-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fat-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fat-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fb-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "firewire-core-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "firewire-core-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "firewire-core-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "firewire-core-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "floppy-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "floppy-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "floppy-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "floppy-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-core-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-core-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-core-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-core-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-core-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "input-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "input-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "input-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "input-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "input-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ipmi-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ipmi-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ipmi-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ipmi-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ipmi-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "irda-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "irda-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "irda-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "irda-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "irda-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "kernel-image-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "kernel-image-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "kernel-image-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "kernel-image-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "kernel-image-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-13-generic" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-13-lowlatency" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13-generic" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13-generic-lpae" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13-lowlatency" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13-powerpc-e500mc" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13-powerpc-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13-powerpc64-emb" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-headers-4.4.0-13-powerpc64-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-generic" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-generic-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-generic-lpae" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-generic-lpae-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-lowlatency" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-lowlatency-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc-e500mc" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc-e500mc-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc-smp-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc64-emb" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc64-emb-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc64-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-4.4.0-13-powerpc64-smp-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-image-extra-4.4.0-13-generic" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-13" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-13-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-tools-4.4.0-13" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-tools-4.4.0-13-dbgsym" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-udebs-generic" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-udebs-generic-lpae" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-udebs-powerpc-e500mc" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-udebs-powerpc-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-lts-xenial-udebs-powerpc64-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-tools-4.4.0-13-generic" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-tools-4.4.0-13-generic-lpae" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-tools-4.4.0-13-lowlatency" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-tools-4.4.0-13-powerpc-e500mc" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-tools-4.4.0-13-powerpc-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-tools-4.4.0-13-powerpc64-emb" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "linux-tools-4.4.0-13-powerpc64-smp" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "md-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "md-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "md-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "md-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "md-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "message-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "message-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "message-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "message-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "mouse-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "mouse-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "mouse-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "mouse-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "mouse-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "multipath-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "multipath-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "multipath-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "multipath-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "multipath-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nfs-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nfs-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nfs-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nfs-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nfs-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-pcmcia-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-shared-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-shared-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-shared-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-shared-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-shared-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-usb-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-usb-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-usb-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-usb-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "nic-usb-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "parport-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "parport-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "parport-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "parport-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "parport-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "pata-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "pata-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "pata-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "pata-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "pcmcia-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "pcmcia-storage-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "plip-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "plip-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "plip-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "plip-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "plip-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ppp-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ppp-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ppp-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ppp-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "ppp-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "sata-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "sata-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "sata-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "sata-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "sata-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "scsi-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "scsi-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "scsi-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "scsi-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "scsi-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "serial-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "speakup-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "speakup-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "speakup-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "speakup-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "speakup-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "squashfs-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "squashfs-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "squashfs-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "squashfs-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "squashfs-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "storage-core-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "storage-core-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "storage-core-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "storage-core-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "storage-core-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "usb-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "usb-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "usb-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "usb-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "usb-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "virtio-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "virtio-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "virtio-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "virtio-modules-4.4.0-13-powerpc64-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "vlan-modules-4.4.0-13-generic-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "vlan-modules-4.4.0-13-generic-lpae-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "vlan-modules-4.4.0-13-powerpc-e500mc-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "vlan-modules-4.4.0-13-powerpc-smp-di" }, { "binary_version": "4.4.0-13.29~14.04.1", "binary_name": "vlan-modules-4.4.0-13-powerpc64-smp-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-2.16", "binary_name": "block-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "block-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "block-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "block-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "block-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "crypto-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "crypto-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "crypto-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "crypto-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "crypto-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "dasd-extra-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "dasd-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fat-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fat-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fat-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fat-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fat-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fb-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "firewire-core-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "firewire-core-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "firewire-core-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "firewire-core-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "floppy-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "floppy-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "floppy-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "floppy-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-core-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-core-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-core-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-core-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-core-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-secondary-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-secondary-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-secondary-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-secondary-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "fs-secondary-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "input-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "input-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "input-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "input-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "input-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ipmi-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ipmi-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ipmi-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ipmi-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ipmi-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "irda-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "irda-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "irda-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "irda-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "irda-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "kernel-image-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "kernel-image-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "kernel-image-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "kernel-image-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "kernel-image-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-cloud-tools-4.4.0-2" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-cloud-tools-4.4.0-2-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-cloud-tools-4.4.0-2-generic" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-cloud-tools-4.4.0-2-lowlatency" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-doc" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2-generic" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2-generic-lpae" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2-lowlatency" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2-powerpc-e500mc" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2-powerpc-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2-powerpc64-emb" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-headers-4.4.0-2-powerpc64-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-generic" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-generic-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-generic-lpae" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-generic-lpae-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-lowlatency" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-lowlatency-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc-e500mc" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc-e500mc-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc-smp-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc64-emb" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc64-emb-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc64-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-4.4.0-2-powerpc64-smp-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-image-extra-4.4.0-2-generic" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-libc-dev" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-source-4.4.0" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-dbgsym" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-generic" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-generic-lpae" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-lowlatency" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-powerpc-e500mc" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-powerpc-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-powerpc64-emb" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-4.4.0-2-powerpc64-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-tools-common" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-udebs-generic" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-udebs-powerpc-e500mc" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-udebs-powerpc-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "linux-udebs-powerpc64-smp" }, { "binary_version": "4.4.0-2.16", "binary_name": "md-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "md-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "md-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "md-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "md-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "message-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "message-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "message-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "message-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "mouse-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "mouse-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "mouse-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "mouse-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "mouse-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "multipath-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "multipath-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "multipath-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "multipath-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "multipath-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nfs-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nfs-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nfs-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nfs-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nfs-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-pcmcia-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-shared-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-shared-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-shared-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-shared-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-shared-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-usb-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-usb-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-usb-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-usb-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "nic-usb-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "parport-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "parport-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "parport-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "parport-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "parport-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "pata-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "pata-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "pata-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "pata-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "pcmcia-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "pcmcia-storage-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "plip-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "plip-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "plip-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "plip-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "plip-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ppp-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ppp-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ppp-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ppp-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "ppp-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "sata-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "sata-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "sata-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "sata-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "sata-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "scsi-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "scsi-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "scsi-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "scsi-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "scsi-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "serial-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "speakup-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "speakup-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "speakup-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "speakup-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "speakup-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "squashfs-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "squashfs-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "squashfs-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "squashfs-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "squashfs-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "storage-core-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "storage-core-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "storage-core-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "storage-core-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "storage-core-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "usb-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "usb-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "usb-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "usb-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "usb-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "virtio-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "virtio-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "virtio-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "virtio-modules-4.4.0-2-powerpc64-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "vlan-modules-4.4.0-2-generic-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "vlan-modules-4.4.0-2-generic-lpae-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "vlan-modules-4.4.0-2-powerpc-e500mc-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "vlan-modules-4.4.0-2-powerpc-smp-di" }, { "binary_version": "4.4.0-2.16", "binary_name": "vlan-modules-4.4.0-2-powerpc64-smp-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-cloud-tools-4.4.0-1001" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-cloud-tools-4.4.0-1001-dbgsym" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-cloud-tools-common" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-headers-4.4.0-1001" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-source-4.4.0" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-tools-4.4.0-1001" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-tools-4.4.0-1001-dbgsym" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-aws-tools-common" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-cloud-tools-4.4.0-1001-aws" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-headers-4.4.0-1001-aws" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-image-4.4.0-1001-aws" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-image-4.4.0-1001-aws-dbgsym" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-image-extra-4.4.0-1001-aws" }, { "binary_version": "4.4.0-1001.10", "binary_name": "linux-tools-4.4.0-1001-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-aws-headers-4.15.0-1030" }, { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-aws-hwe-tools-4.15.0-1030" }, { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-aws-hwe-tools-4.15.0-1030-dbgsym" }, { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-headers-4.15.0-1030-aws" }, { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-image-4.15.0-1030-aws" }, { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-image-4.15.0-1030-aws-dbgsym" }, { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-modules-4.15.0-1030-aws" }, { "binary_version": "4.15.0-1030.31~16.04.1", "binary_name": "linux-tools-4.15.0-1030-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.11.0-1009.9", "binary_name": "linux-azure-cloud-tools-4.11.0-1009" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-azure-cloud-tools-4.11.0-1009-dbgsym" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-azure-headers-4.11.0-1009" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-azure-tools-4.11.0-1009" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-azure-tools-4.11.0-1009-dbgsym" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-cloud-tools-4.11.0-1009-azure" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-headers-4.11.0-1009-azure" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-image-4.11.0-1009-azure" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-image-4.11.0-1009-azure-dbgsym" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-image-extra-4.11.0-1009-azure" }, { "binary_version": "4.11.0-1009.9", "binary_name": "linux-tools-4.11.0-1009-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.10.0-1004.4", "binary_name": "linux-cloud-tools-4.10.0-1004-gcp" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-gcp-cloud-tools-4.10.0-1004" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-gcp-cloud-tools-4.10.0-1004-dbgsym" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-gcp-headers-4.10.0-1004" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-gcp-tools-4.10.0-1004" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-gcp-tools-4.10.0-1004-dbgsym" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-headers-4.10.0-1004-gcp" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-image-4.10.0-1004-gcp" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-image-4.10.0-1004-gcp-dbgsym" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-image-extra-4.10.0-1004-gcp" }, { "binary_version": "4.10.0-1004.4", "binary_name": "linux-tools-4.10.0-1004-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "block-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "block-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "crypto-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "crypto-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "dasd-extra-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "dasd-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "fat-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "fat-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "fb-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "firewire-core-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "floppy-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "fs-core-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "fs-core-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "fs-secondary-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "fs-secondary-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "input-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "input-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "ipmi-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "ipmi-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "irda-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "irda-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "kernel-image-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "kernel-image-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-cloud-tools-4.8.0-39-generic" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-cloud-tools-4.8.0-39-lowlatency" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-headers-4.8.0-39" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-headers-4.8.0-39-generic" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-headers-4.8.0-39-generic-lpae" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-headers-4.8.0-39-lowlatency" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-hwe-cloud-tools-4.8.0-39" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-hwe-cloud-tools-4.8.0-39-dbgsym" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-hwe-tools-4.8.0-39" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-hwe-tools-4.8.0-39-dbgsym" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-hwe-udebs-generic" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-hwe-udebs-generic-lpae" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-image-4.8.0-39-generic" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-image-4.8.0-39-generic-dbgsym" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-image-4.8.0-39-generic-lpae" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-image-4.8.0-39-generic-lpae-dbgsym" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-image-4.8.0-39-lowlatency" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-image-4.8.0-39-lowlatency-dbgsym" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-image-extra-4.8.0-39-generic" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-source-4.8.0" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-tools-4.8.0-39-generic" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-tools-4.8.0-39-generic-lpae" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "linux-tools-4.8.0-39-lowlatency" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "md-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "md-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "message-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "mouse-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "mouse-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "multipath-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "multipath-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nfs-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nfs-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nic-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nic-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nic-pcmcia-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nic-shared-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nic-shared-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nic-usb-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "nic-usb-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "parport-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "parport-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "pata-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "pcmcia-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "pcmcia-storage-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "plip-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "plip-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "ppp-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "ppp-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "sata-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "sata-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "scsi-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "scsi-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "serial-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "storage-core-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "storage-core-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "usb-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "usb-modules-4.8.0-39-generic-lpae-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "virtio-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "vlan-modules-4.8.0-39-generic-di" }, { "binary_version": "4.8.0-39.42~16.04.1", "binary_name": "vlan-modules-4.8.0-39-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-1004.9", "binary_name": "linux-cloud-tools-4.4.0-1004-kvm" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-headers-4.4.0-1004-kvm" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-image-4.4.0-1004-kvm" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-image-4.4.0-1004-kvm-dbgsym" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-kvm-cloud-tools-4.4.0-1004" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-kvm-cloud-tools-4.4.0-1004-dbgsym" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-kvm-headers-4.4.0-1004" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-kvm-tools-4.4.0-1004" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-kvm-tools-4.4.0-1004-dbgsym" }, { "binary_version": "4.4.0-1004.9", "binary_name": "linux-tools-4.4.0-1004-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-headers-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1007-oracle-dbgsym" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-modules-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-oracle-headers-4.15.0-1007" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-oracle-tools-4.15.0-1007" }, { "binary_version": "4.15.0-1007.9~16.04.1", "binary_name": "linux-tools-4.15.0-1007-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-1003.3", "binary_name": "block-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "crypto-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "dasd-extra-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "dasd-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "fat-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "fb-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "firewire-core-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "floppy-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "fs-core-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "fs-secondary-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "input-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "ipmi-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "irda-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "kernel-image-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-fips-cloud-tools-common" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-fips-headers-4.4.0-1003" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-fips-source-4.4.0" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-fips-tools-4.4.0-1003" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-fips-tools-4.4.0-1003-dbgsym" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-headers-4.4.0-1003-fips" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-image-4.4.0-1003-fips" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-image-4.4.0-1003-fips-dbgsym" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-image-extra-4.4.0-1003-fips" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-image-hmac-4.4.0-1003-fips" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-tools-4.4.0-1003-fips" }, { "binary_version": "4.4.0-1003.3", "binary_name": "linux-udebs-fips" }, { "binary_version": "4.4.0-1003.3", "binary_name": "md-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "message-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "mouse-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "multipath-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "nfs-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "nic-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "nic-pcmcia-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "nic-shared-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "nic-usb-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "parport-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "pata-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "pcmcia-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "pcmcia-storage-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "plip-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "ppp-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "sata-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "scsi-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "serial-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "speakup-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "storage-core-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "usb-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "virtio-modules-4.4.0-1003-fips-di" }, { "binary_version": "4.4.0-1003.3", "binary_name": "vlan-modules-4.4.0-1003-fips-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-1001.1", "binary_name": "block-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "crypto-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "dasd-extra-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "dasd-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "fat-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "fb-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "firewire-core-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "floppy-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "fs-core-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "fs-secondary-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "input-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "ipmi-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "irda-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "kernel-image-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-fips-headers-4.4.0-1001" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-fips-source-4.4.0" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-fips-tools-4.4.0-1001" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-fips-tools-4.4.0-1001-dbgsym" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-headers-4.4.0-1001-fips" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-image-4.4.0-1001-fips" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-image-4.4.0-1001-fips-dbgsym" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-image-extra-4.4.0-1001-fips" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-image-hmac-4.4.0-1001-fips" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-tools-4.4.0-1001-fips" }, { "binary_version": "4.4.0-1001.1", "binary_name": "linux-udebs-fips" }, { "binary_version": "4.4.0-1001.1", "binary_name": "md-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "message-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "mouse-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "multipath-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "nfs-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "nic-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "nic-pcmcia-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "nic-shared-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "nic-usb-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "parport-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "pata-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "pcmcia-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "pcmcia-storage-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "plip-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "ppp-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "sata-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "scsi-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "serial-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "speakup-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "storage-core-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "usb-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "virtio-modules-4.4.0-1001-fips-di" }, { "binary_version": "4.4.0-1001.1", "binary_name": "vlan-modules-4.4.0-1001-fips-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.13.0-16.19", "binary_name": "block-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "block-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "crypto-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "crypto-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "dasd-extra-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "dasd-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "fat-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "fat-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "fb-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "firewire-core-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "floppy-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "fs-core-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "fs-core-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "fs-secondary-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "fs-secondary-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "input-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "input-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "ipmi-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "ipmi-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "irda-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "irda-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "kernel-image-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "kernel-image-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-cloud-tools-4.13.0-16" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-cloud-tools-4.13.0-16-dbgsym" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-cloud-tools-4.13.0-16-generic" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-cloud-tools-4.13.0-16-lowlatency" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-doc" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-headers-4.13.0-16" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-headers-4.13.0-16-generic" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-headers-4.13.0-16-generic-lpae" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-headers-4.13.0-16-lowlatency" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-image-4.13.0-16-generic" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-image-4.13.0-16-generic-dbgsym" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-image-4.13.0-16-generic-lpae" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-image-4.13.0-16-generic-lpae-dbgsym" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-image-4.13.0-16-lowlatency" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-image-4.13.0-16-lowlatency-dbgsym" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-image-extra-4.13.0-16-generic" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-libc-dev" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-source-4.13.0" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-tools-4.13.0-16" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-tools-4.13.0-16-dbgsym" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-tools-4.13.0-16-generic" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-tools-4.13.0-16-generic-lpae" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-tools-4.13.0-16-lowlatency" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-tools-common" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-udebs-generic" }, { "binary_version": "4.13.0-16.19", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "4.13.0-16.19", "binary_name": "md-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "md-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "message-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "mouse-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "mouse-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "multipath-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "multipath-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nfs-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nfs-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nic-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nic-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nic-pcmcia-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nic-shared-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nic-shared-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nic-usb-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "nic-usb-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "parport-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "parport-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "pata-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "pcmcia-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "pcmcia-storage-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "plip-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "plip-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "ppp-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "ppp-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "sata-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "sata-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "scsi-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "scsi-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "serial-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "storage-core-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "storage-core-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "usb-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "usb-modules-4.13.0-16-generic-lpae-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "virtio-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "vlan-modules-4.13.0-16-generic-di" }, { "binary_version": "4.13.0-16.19", "binary_name": "vlan-modules-4.13.0-16-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1001.1", "binary_name": "linux-aws-cloud-tools-4.15.0-1001" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-aws-cloud-tools-4.15.0-1001-dbgsym" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-aws-headers-4.15.0-1001" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-aws-tools-4.15.0-1001" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-aws-tools-4.15.0-1001-dbgsym" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-cloud-tools-4.15.0-1001-aws" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-headers-4.15.0-1001-aws" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-image-4.15.0-1001-aws" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-image-4.15.0-1001-aws-dbgsym" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-tools-4.15.0-1001-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1018" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-aws-5.4-headers-5.4.0-1018" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-aws-5.4-tools-5.4.0-1018" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1018-aws" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-1018-aws" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-headers-5.4.0-1018-aws" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-image-5.4.0-1018-aws" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-image-5.4.0-1018-aws-dbgsym" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-modules-5.4.0-1018-aws" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1018-aws" }, { "binary_version": "5.4.0-1018.18~18.04.1", "binary_name": "linux-tools-5.4.0-1018-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1082.92", "binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1082" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-azure-4.15-headers-4.15.0-1082" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-azure-4.15-tools-4.15.0-1082" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-buildinfo-4.15.0-1082-azure" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-cloud-tools-4.15.0-1082-azure" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-headers-4.15.0-1082-azure" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-image-unsigned-4.15.0-1082-azure" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-image-unsigned-4.15.0-1082-azure-dbgsym" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-modules-4.15.0-1082-azure" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-modules-extra-4.15.0-1082-azure" }, { "binary_version": "4.15.0-1082.92", "binary_name": "linux-tools-4.15.0-1082-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1020" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-azure-5.4-headers-5.4.0-1020" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-azure-5.4-tools-5.4.0-1020" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1020-azure" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-1020-azure" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-headers-5.4.0-1020-azure" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1020-azure" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1020-azure-dbgsym" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-modules-5.4.0-1020-azure" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1020-azure" }, { "binary_version": "5.4.0-1020.20~18.04.1", "binary_name": "linux-tools-5.4.0-1020-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1005.8", "binary_name": "linux-buildinfo-4.15.0-1005-dell300x" }, { "binary_version": "4.15.0-1005.8", "binary_name": "linux-dell300x-headers-4.15.0-1005" }, { "binary_version": "4.15.0-1005.8", "binary_name": "linux-dell300x-tools-4.15.0-1005" }, { "binary_version": "4.15.0-1005.8", "binary_name": "linux-headers-4.15.0-1005-dell300x" }, { "binary_version": "4.15.0-1005.8", "binary_name": "linux-image-unsigned-4.15.0-1005-dell300x" }, { "binary_version": "4.15.0-1005.8", "binary_name": "linux-image-unsigned-4.15.0-1005-dell300x-dbgsym" }, { "binary_version": "4.15.0-1005.8", "binary_name": "linux-modules-4.15.0-1005-dell300x" }, { "binary_version": "4.15.0-1005.8", "binary_name": "linux-tools-4.15.0-1005-dell300x" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1071.81", "binary_name": "linux-buildinfo-4.15.0-1071-gcp" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-gcp-4.15-headers-4.15.0-1071" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-gcp-4.15-tools-4.15.0-1071" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-headers-4.15.0-1071-gcp" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-image-unsigned-4.15.0-1071-gcp" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-image-unsigned-4.15.0-1071-gcp-dbgsym" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-modules-4.15.0-1071-gcp" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-modules-extra-4.15.0-1071-gcp" }, { "binary_version": "4.15.0-1071.81", "binary_name": "linux-tools-4.15.0-1071-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-buildinfo-5.4.0-1019-gcp" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-gcp-5.4-headers-5.4.0-1019" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-gcp-5.4-tools-5.4.0-1019" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-headers-5.4.0-1019-gcp" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-1019-gcp" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-1019-gcp-dbgsym" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-modules-5.4.0-1019-gcp" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-modules-extra-5.4.0-1019-gcp" }, { "binary_version": "5.4.0-1019.19~18.04.2", "binary_name": "linux-tools-5.4.0-1019-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "block-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "block-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "crypto-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "crypto-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "dasd-extra-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "dasd-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "fat-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "fat-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "fb-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "firewire-core-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "floppy-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "fs-core-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "fs-core-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "fs-secondary-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "fs-secondary-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "input-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "input-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "ipmi-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "ipmi-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "kernel-image-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "kernel-image-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-buildinfo-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-buildinfo-5.4.0-37-generic-lpae" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-buildinfo-5.4.0-37-lowlatency" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-37-lowlatency" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-headers-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-headers-5.4.0-37-generic-lpae" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-headers-5.4.0-37-lowlatency" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-37" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-headers-5.4.0-37" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-source-5.4.0" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-tools-5.4.0-37" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-tools-common" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-udebs-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-hwe-5.4-udebs-generic-lpae" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-5.4.0-37-generic-dbgsym" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-5.4.0-37-generic-lpae" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-5.4.0-37-generic-lpae-dbgsym" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-5.4.0-37-lowlatency" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-5.4.0-37-lowlatency-dbgsym" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-37-generic-dbgsym" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-37-lowlatency" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-37-lowlatency-dbgsym" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-modules-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-modules-5.4.0-37-generic-lpae" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-modules-5.4.0-37-lowlatency" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-modules-extra-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-tools-5.4.0-37-generic" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-tools-5.4.0-37-generic-lpae" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "linux-tools-5.4.0-37-lowlatency" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "md-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "md-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "message-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "mouse-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "mouse-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "multipath-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "multipath-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nfs-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nfs-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nic-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nic-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nic-pcmcia-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nic-shared-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nic-shared-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nic-usb-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "nic-usb-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "parport-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "parport-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "pata-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "pcmcia-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "pcmcia-storage-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "plip-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "plip-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "ppp-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "ppp-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "sata-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "sata-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "scsi-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "scsi-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "serial-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "storage-core-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "storage-core-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "usb-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "usb-modules-5.4.0-37-generic-lpae-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "virtio-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "vlan-modules-5.4.0-37-generic-di" }, { "binary_version": "5.4.0-37.41~18.04.1", "binary_name": "vlan-modules-5.4.0-37-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "block-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "block-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "crypto-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "crypto-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "dasd-extra-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "dasd-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "fat-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "fat-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "fb-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "firewire-core-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "floppy-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "fs-core-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "fs-core-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "fs-secondary-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "fs-secondary-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "input-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "input-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "ipmi-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "ipmi-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "kernel-image-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "kernel-image-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-buildinfo-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-buildinfo-5.0.0-15-generic-lpae" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-buildinfo-5.0.0-15-lowlatency" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-cloud-tools-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-cloud-tools-5.0.0-15-lowlatency" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-headers-5.0.0-15" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-headers-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-headers-5.0.0-15-generic-lpae" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-headers-5.0.0-15-lowlatency" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-hwe-edge-cloud-tools-5.0.0-15" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-hwe-edge-tools-5.0.0-15" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-hwe-edge-udebs-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-hwe-edge-udebs-generic-lpae" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-5.0.0-15-generic-dbgsym" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-5.0.0-15-generic-lpae" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-5.0.0-15-generic-lpae-dbgsym" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-5.0.0-15-lowlatency" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-5.0.0-15-lowlatency-dbgsym" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-unsigned-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-unsigned-5.0.0-15-generic-dbgsym" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-unsigned-5.0.0-15-lowlatency" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-image-unsigned-5.0.0-15-lowlatency-dbgsym" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-modules-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-modules-5.0.0-15-generic-lpae" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-modules-5.0.0-15-lowlatency" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-modules-extra-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-source-5.0.0" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-tools-5.0.0-15-generic" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-tools-5.0.0-15-generic-lpae" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "linux-tools-5.0.0-15-lowlatency" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "md-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "md-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "message-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "mouse-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "mouse-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "multipath-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "multipath-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nfs-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nfs-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nic-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nic-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nic-pcmcia-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nic-shared-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nic-shared-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nic-usb-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "nic-usb-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "parport-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "parport-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "pata-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "pcmcia-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "pcmcia-storage-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "plip-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "plip-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "ppp-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "ppp-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "sata-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "sata-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "scsi-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "scsi-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "serial-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "storage-core-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "storage-core-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "usb-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "usb-modules-5.0.0-15-generic-lpae-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "virtio-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "vlan-modules-5.0.0-15-generic-di" }, { "binary_version": "5.0.0-15.16~18.04.1", "binary_name": "vlan-modules-5.0.0-15-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-buildinfo-5.4.0-1010-ibm" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-headers-5.4.0-1010-ibm" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-ibm-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-ibm-5.4-headers-5.4.0-1010" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-ibm-5.4-source-5.4.0" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-ibm-5.4-tools-5.4.0-1010" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-ibm-5.4-tools-common" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-1010-ibm" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-1010-ibm-dbgsym" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-modules-5.4.0-1010-ibm" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-modules-extra-5.4.0-1010-ibm" }, { "binary_version": "5.4.0-1010.11~18.04.2", "binary_name": "linux-tools-5.4.0-1010-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1002.2", "binary_name": "linux-cloud-tools-4.15.0-1002-kvm" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-headers-4.15.0-1002-kvm" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-4.15.0-1002-kvm" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-4.15.0-1002-kvm-dbgsym" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-kvm-cloud-tools-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-kvm-cloud-tools-4.15.0-1002-dbgsym" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-kvm-headers-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-kvm-tools-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-kvm-tools-4.15.0-1002-dbgsym" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-tools-4.15.0-1002-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.0.0-1010.11", "binary_name": "block-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "crypto-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "fat-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "fb-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "firewire-core-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "floppy-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "fs-core-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "fs-secondary-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "input-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "ipmi-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "kernel-image-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-buildinfo-5.0.0-1010-oem-osp1" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-headers-5.0.0-1010-oem-osp1" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-image-unsigned-5.0.0-1010-oem-osp1" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-image-unsigned-5.0.0-1010-oem-osp1-dbgsym" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-modules-5.0.0-1010-oem-osp1" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-oem-osp1-headers-5.0.0-1010" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-oem-osp1-tools-5.0.0-1010" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-oem-osp1-tools-host" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-tools-5.0.0-1010-oem-osp1" }, { "binary_version": "5.0.0-1010.11", "binary_name": "linux-udebs-oem-osp1" }, { "binary_version": "5.0.0-1010.11", "binary_name": "md-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "message-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "mouse-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "multipath-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "nfs-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "nic-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "nic-pcmcia-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "nic-shared-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "nic-usb-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "parport-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "pata-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "pcmcia-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "pcmcia-storage-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "plip-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "ppp-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "sata-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "scsi-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "serial-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "storage-core-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "usb-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "virtio-modules-5.0.0-1010-oem-osp1-di" }, { "binary_version": "5.0.0-1010.11", "binary_name": "vlan-modules-5.0.0-1010-oem-osp1-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1007.9", "binary_name": "linux-buildinfo-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-headers-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-image-unsigned-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-image-unsigned-4.15.0-1007-oracle-dbgsym" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-modules-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-modules-extra-4.15.0-1007-oracle" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-oracle-headers-4.15.0-1007" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-oracle-tools-4.15.0-1007" }, { "binary_version": "4.15.0-1007.9", "binary_name": "linux-tools-4.15.0-1007-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1019-oracle" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-headers-5.4.0-1019-oracle" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1019-oracle" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1019-oracle-dbgsym" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-modules-5.4.0-1019-oracle" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1019-oracle" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-oracle-5.4-headers-5.4.0-1019" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-oracle-5.4-tools-5.4.0-1019" }, { "binary_version": "5.4.0-1019.19~18.04.1", "binary_name": "linux-tools-5.4.0-1019-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1013-raspi" }, { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-headers-5.4.0-1013-raspi" }, { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-image-5.4.0-1013-raspi" }, { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-image-5.4.0-1013-raspi-dbgsym" }, { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-modules-5.4.0-1013-raspi" }, { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-raspi-5.4-headers-5.4.0-1013" }, { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-raspi-5.4-tools-5.4.0-1013" }, { "binary_version": "5.4.0-1013.13~18.04.1", "binary_name": "linux-tools-5.4.0-1013-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.13.0-1005.5", "binary_name": "linux-headers-4.13.0-1005-raspi2" }, { "binary_version": "4.13.0-1005.5", "binary_name": "linux-image-4.13.0-1005-raspi2" }, { "binary_version": "4.13.0-1005.5", "binary_name": "linux-image-4.13.0-1005-raspi2-dbgsym" }, { "binary_version": "4.13.0-1005.5", "binary_name": "linux-raspi2-headers-4.13.0-1005" }, { "binary_version": "4.13.0-1005.5", "binary_name": "linux-raspi2-tools-4.13.0-1005" }, { "binary_version": "4.13.0-1005.5", "binary_name": "linux-raspi2-tools-4.13.0-1005-dbgsym" }, { "binary_version": "4.13.0-1005.5", "binary_name": "linux-tools-4.13.0-1005-raspi2" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.4.0-1077.82", "binary_name": "linux-headers-4.4.0-1077-snapdragon" }, { "binary_version": "4.4.0-1077.82", "binary_name": "linux-image-4.4.0-1077-snapdragon" }, { "binary_version": "4.4.0-1077.82", "binary_name": "linux-image-4.4.0-1077-snapdragon-dbgsym" }, { "binary_version": "4.4.0-1077.82", "binary_name": "linux-snapdragon-headers-4.4.0-1077" }, { "binary_version": "4.4.0-1077.82", "binary_name": "linux-snapdragon-tools-4.4.0-1077" }, { "binary_version": "4.4.0-1077.82", "binary_name": "linux-snapdragon-tools-4.4.0-1077-dbgsym" }, { "binary_version": "4.4.0-1077.82", "binary_name": "linux-tools-4.4.0-1077-snapdragon" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-2000.4", "binary_name": "linux-aws-fips-headers-4.15.0-2000" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-aws-fips-tools-4.15.0-2000" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-buildinfo-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-headers-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips-dbgsym" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-modules-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-modules-extra-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-tools-4.15.0-2000-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1002.2", "binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-azure-fips-headers-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-azure-fips-tools-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-buildinfo-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-headers-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips-dbgsym" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-modules-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-modules-extra-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-tools-4.15.0-1002-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1027.32", "binary_name": "linux-buildinfo-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-fips-headers-4.15.0-1027" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-fips-tools-4.15.0-1027" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-fips-tools-host" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-headers-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-image-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-image-4.15.0-1027-fips-dbgsym" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-image-hmac-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-image-unsigned-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-image-unsigned-4.15.0-1027-fips-dbgsym" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-image-unsigned-hmac-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-modules-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-modules-extra-4.15.0-1027-fips" }, { "binary_version": "4.15.0-1027.32", "binary_name": "linux-tools-4.15.0-1027-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-2013.14", "binary_name": "linux-buildinfo-4.15.0-2013-gcp-fips" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-gcp-fips-headers-4.15.0-2013" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-gcp-fips-tools-4.15.0-2013" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-headers-4.15.0-2013-gcp-fips" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-image-unsigned-4.15.0-2013-gcp-fips" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-image-unsigned-4.15.0-2013-gcp-fips-dbgsym" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-image-unsigned-hmac-4.15.0-2013-gcp-fips" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-modules-4.15.0-2013-gcp-fips" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-modules-extra-4.15.0-2013-gcp-fips" }, { "binary_version": "4.15.0-2013.14", "binary_name": "linux-tools-4.15.0-2013-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-2000.4", "binary_name": "linux-aws-fips-headers-4.15.0-2000" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-aws-fips-tools-4.15.0-2000" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-buildinfo-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-headers-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips-dbgsym" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-modules-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-modules-extra-4.15.0-2000-aws-fips" }, { "binary_version": "4.15.0-2000.4", "binary_name": "linux-tools-4.15.0-2000-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1002.2", "binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-azure-fips-headers-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-azure-fips-tools-4.15.0-1002" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-buildinfo-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-headers-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips-dbgsym" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-modules-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-modules-extra-4.15.0-1002-azure-fips" }, { "binary_version": "4.15.0-1002.2", "binary_name": "linux-tools-4.15.0-1002-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1011.12", "binary_name": "linux-buildinfo-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-fips-headers-4.15.0-1011" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-fips-tools-4.15.0-1011" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-fips-tools-host" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-headers-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-image-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-image-4.15.0-1011-fips-dbgsym" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-image-hmac-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-image-unsigned-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-image-unsigned-4.15.0-1011-fips-dbgsym" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-image-unsigned-hmac-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-modules-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-modules-extra-4.15.0-1011-fips" }, { "binary_version": "4.15.0-1011.12", "binary_name": "linux-tools-4.15.0-1011-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "4.15.0-1001.1", "binary_name": "linux-buildinfo-4.15.0-1001-gcp-fips" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-gcp-fips-headers-4.15.0-1001" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-gcp-fips-tools-4.15.0-1001" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-headers-4.15.0-1001-gcp-fips" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips-dbgsym" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-image-unsigned-hmac-4.15.0-1001-gcp-fips" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-modules-4.15.0-1001-gcp-fips" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-modules-extra-4.15.0-1001-gcp-fips" }, { "binary_version": "4.15.0-1001.1", "binary_name": "linux-tools-4.15.0-1001-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-9.12", "binary_name": "block-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "block-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "crypto-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "crypto-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "dasd-extra-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "dasd-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "fat-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "fat-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "fb-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "firewire-core-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "floppy-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "fs-core-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "fs-core-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "fs-secondary-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "fs-secondary-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "input-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "input-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "ipmi-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "ipmi-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "kernel-image-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "kernel-image-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-buildinfo-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-buildinfo-5.4.0-9-generic-lpae" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-buildinfo-5.4.0-9-lowlatency" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-buildinfo-5.4.0-9-snapdragon" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-cloud-tools-5.4.0-9" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-cloud-tools-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-cloud-tools-5.4.0-9-lowlatency" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-doc" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-headers-5.4.0-9" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-headers-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-headers-5.4.0-9-generic-lpae" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-headers-5.4.0-9-lowlatency" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-headers-5.4.0-9-snapdragon" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-5.4.0-9-generic-dbgsym" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-5.4.0-9-generic-lpae" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-5.4.0-9-generic-lpae-dbgsym" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-unsigned-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-unsigned-5.4.0-9-generic-dbgsym" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-unsigned-5.4.0-9-lowlatency" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-unsigned-5.4.0-9-lowlatency-dbgsym" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-unsigned-5.4.0-9-snapdragon" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-image-unsigned-5.4.0-9-snapdragon-dbgsym" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-libc-dev" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-modules-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-modules-5.4.0-9-generic-lpae" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-modules-5.4.0-9-lowlatency" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-modules-5.4.0-9-snapdragon" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-modules-extra-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-source-5.4.0" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-tools-5.4.0-9" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-tools-5.4.0-9-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-tools-5.4.0-9-generic-lpae" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-tools-5.4.0-9-lowlatency" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-tools-5.4.0-9-snapdragon" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-tools-common" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-tools-host" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-udebs-generic" }, { "binary_version": "5.4.0-9.12", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "5.4.0-9.12", "binary_name": "md-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "md-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "message-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "mouse-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "mouse-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "multipath-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "multipath-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nfs-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nfs-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nic-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nic-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nic-pcmcia-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nic-shared-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nic-shared-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nic-usb-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "nic-usb-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "parport-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "parport-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "pata-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "pcmcia-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "pcmcia-storage-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "plip-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "plip-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "ppp-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "ppp-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "sata-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "sata-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "scsi-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "scsi-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "serial-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "storage-core-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "storage-core-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "usb-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "usb-modules-5.4.0-9-generic-lpae-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "virtio-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "vlan-modules-5.4.0-9-generic-di" }, { "binary_version": "5.4.0-9.12", "binary_name": "vlan-modules-5.4.0-9-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1005.5", "binary_name": "linux-aws-cloud-tools-5.4.0-1005" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-aws-headers-5.4.0-1005" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-aws-tools-5.4.0-1005" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-buildinfo-5.4.0-1005-aws" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-cloud-tools-5.4.0-1005-aws" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-headers-5.4.0-1005-aws" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-image-5.4.0-1005-aws" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-image-5.4.0-1005-aws-dbgsym" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-modules-5.4.0-1005-aws" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-modules-extra-5.4.0-1005-aws" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-tools-5.4.0-1005-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1041" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-aws-5.15-headers-5.15.0-1041" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-aws-5.15-tools-5.15.0-1041" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1041-aws" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1041-aws" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-headers-5.15.0-1041-aws" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1041-aws" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1041-aws-dbgsym" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-modules-5.15.0-1041-aws" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1041-aws" }, { "binary_version": "5.15.0-1041.46~20.04.1", "binary_name": "linux-tools-5.15.0-1041-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1006.6", "binary_name": "linux-azure-cloud-tools-5.4.0-1006" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-azure-headers-5.4.0-1006" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-azure-tools-5.4.0-1006" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-buildinfo-5.4.0-1006-azure" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-cloud-tools-5.4.0-1006-azure" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-headers-5.4.0-1006-azure" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-image-unsigned-5.4.0-1006-azure" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-image-unsigned-5.4.0-1006-azure-dbgsym" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-modules-5.4.0-1006-azure" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-modules-extra-5.4.0-1006-azure" }, { "binary_version": "5.4.0-1006.6", "binary_name": "linux-tools-5.4.0-1006-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1043" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-azure-5.15-headers-5.15.0-1043" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-azure-5.15-tools-5.15.0-1043" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1043-azure" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1043-azure" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-headers-5.15.0-1043-azure" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1043-azure" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1043-azure-dbgsym" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-modules-5.15.0-1043-azure" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1043-azure" }, { "binary_version": "5.15.0-1043.50~20.04.1", "binary_name": "linux-tools-5.15.0-1043-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1043.50~20.04.1.1", "binary_name": "linux-image-unsigned-5.15.0-1043-azure-fde" }, { "binary_version": "5.15.0-1043.50~20.04.1.1", "binary_name": "linux-image-unsigned-5.15.0-1043-azure-fde-dbgsym" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1007.10", "binary_name": "linux-bluefield-headers-5.4.0-1007" }, { "binary_version": "5.4.0-1007.10", "binary_name": "linux-bluefield-tools-5.4.0-1007" }, { "binary_version": "5.4.0-1007.10", "binary_name": "linux-buildinfo-5.4.0-1007-bluefield" }, { "binary_version": "5.4.0-1007.10", "binary_name": "linux-headers-5.4.0-1007-bluefield" }, { "binary_version": "5.4.0-1007.10", "binary_name": "linux-image-unsigned-5.4.0-1007-bluefield" }, { "binary_version": "5.4.0-1007.10", "binary_name": "linux-modules-5.4.0-1007-bluefield" }, { "binary_version": "5.4.0-1007.10", "binary_name": "linux-tools-5.4.0-1007-bluefield" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1005.5", "binary_name": "linux-buildinfo-5.4.0-1005-gcp" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-gcp-headers-5.4.0-1005" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-gcp-tools-5.4.0-1005" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-headers-5.4.0-1005-gcp" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-image-unsigned-5.4.0-1005-gcp" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-image-unsigned-5.4.0-1005-gcp-dbgsym" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-modules-5.4.0-1005-gcp" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-modules-extra-5.4.0-1005-gcp" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-tools-5.4.0-1005-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-gcp-5.15-headers-5.15.0-1039" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-gcp-5.15-tools-5.15.0-1039" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-headers-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-gcp-dbgsym" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-modules-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47~20.04.1", "binary_name": "linux-tools-5.15.0-1039-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1033.35", "binary_name": "linux-buildinfo-5.4.0-1033-gke" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-gke-headers-5.4.0-1033" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-gke-tools-5.4.0-1033" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-headers-5.4.0-1033-gke" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-image-unsigned-5.4.0-1033-gke" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-image-unsigned-5.4.0-1033-gke-dbgsym" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-modules-5.4.0-1033-gke" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-modules-extra-5.4.0-1033-gke" }, { "binary_version": "5.4.0-1033.35", "binary_name": "linux-tools-5.4.0-1033-gke" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-gke-5.15-headers-5.15.0-1039" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-gke-5.15-tools-5.15.0-1039" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-headers-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1039-gke-dbgsym" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-modules-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44~20.04.1", "binary_name": "linux-tools-5.15.0-1039-gke" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1008.9", "binary_name": "linux-buildinfo-5.4.0-1008-gkeop" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-cloud-tools-5.4.0-1008-gkeop" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-gkeop-cloud-tools-5.4.0-1008" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-gkeop-headers-5.4.0-1008" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-gkeop-source-5.4.0" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-gkeop-tools-5.4.0-1008" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-headers-5.4.0-1008-gkeop" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-image-unsigned-5.4.0-1008-gkeop" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-image-unsigned-5.4.0-1008-gkeop-dbgsym" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-modules-5.4.0-1008-gkeop" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-modules-extra-5.4.0-1008-gkeop" }, { "binary_version": "5.4.0-1008.9", "binary_name": "linux-tools-5.4.0-1008-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1025" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-gkeop-5.15-headers-5.15.0-1025" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-gkeop-5.15-tools-5.15.0-1025" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-headers-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1025-gkeop-dbgsym" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-modules-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30~20.04.1", "binary_name": "linux-tools-5.15.0-1025-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-buildinfo-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-buildinfo-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-buildinfo-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-cloud-tools-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-headers-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-headers-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-headers-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-hwe-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-hwe-5.15-headers-5.15.0-79" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-hwe-5.15-source-5.15.0" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-hwe-5.15-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-hwe-5.15-tools-common" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-hwe-5.15-tools-host" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-5.15.0-79-generic-dbgsym" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-5.15.0-79-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-unsigned-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-unsigned-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-unsigned-5.15.0-79-generic-64k-dbgsym" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-image-unsigned-5.15.0-79-generic-dbgsym" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-modules-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-modules-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-modules-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-modules-extra-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-modules-iwlwifi-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-tools-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-tools-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86~20.04.2", "binary_name": "linux-tools-5.15.0-79-generic-lpae" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1003.4", "binary_name": "linux-buildinfo-5.4.0-1003-ibm" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-headers-5.4.0-1003-ibm" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-ibm-headers-5.4.0-1003" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-ibm-source-5.4.0" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-ibm-tools-5.4.0-1003" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-image-unsigned-5.4.0-1003-ibm" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-image-unsigned-5.4.0-1003-ibm-dbgsym" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-modules-5.4.0-1003-ibm" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-modules-extra-5.4.0-1003-ibm" }, { "binary_version": "5.4.0-1003.4", "binary_name": "linux-tools-5.4.0-1003-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-headers-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-ibm-5.15-headers-5.15.0-1035" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-ibm-5.15-source-5.15.0" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-ibm-5.15-tools-5.15.0-1035" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1035-ibm-dbgsym" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-modules-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38~20.04.1", "binary_name": "linux-tools-5.15.0-1035-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-headers-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1037-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1037" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1037" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1037" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-common" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-host" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-modules-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42~20.04.1", "binary_name": "linux-tools-5.15.0-1037-intel-iotg" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1001.3", "binary_name": "linux-buildinfo-5.4.0-1001-iot" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-headers-5.4.0-1001-iot" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-image-unsigned-5.4.0-1001-iot" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-image-unsigned-5.4.0-1001-iot-dbgsym" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-iot-headers-5.4.0-1001" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-iot-tools-5.4.0-1001" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-iot-tools-common" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-modules-5.4.0-1001-iot" }, { "binary_version": "5.4.0-1001.3", "binary_name": "linux-tools-5.4.0-1001-iot" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1004.4", "binary_name": "linux-buildinfo-5.4.0-1004-kvm" }, { "binary_version": "5.4.0-1004.4", "binary_name": "linux-headers-5.4.0-1004-kvm" }, { "binary_version": "5.4.0-1004.4", "binary_name": "linux-image-5.4.0-1004-kvm" }, { "binary_version": "5.4.0-1004.4", "binary_name": "linux-image-5.4.0-1004-kvm-dbgsym" }, { "binary_version": "5.4.0-1004.4", "binary_name": "linux-kvm-headers-5.4.0-1004" }, { "binary_version": "5.4.0-1004.4", "binary_name": "linux-kvm-tools-5.4.0-1004" }, { "binary_version": "5.4.0-1004.4", "binary_name": "linux-modules-5.4.0-1004-kvm" }, { "binary_version": "5.4.0-1004.4", "binary_name": "linux-tools-5.4.0-1004-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-buildinfo-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-buildinfo-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-headers-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-headers-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency-dbgsym" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-79" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-common" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-host" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-modules-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-modules-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-tools-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88~20.04.1", "binary_name": "linux-tools-5.15.0-79-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1005.5", "binary_name": "linux-buildinfo-5.4.0-1005-oracle" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-headers-5.4.0-1005-oracle" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-image-unsigned-5.4.0-1005-oracle" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-image-unsigned-5.4.0-1005-oracle-dbgsym" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-modules-5.4.0-1005-oracle" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-modules-extra-5.4.0-1005-oracle" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-oracle-headers-5.4.0-1005" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-oracle-tools-5.4.0-1005" }, { "binary_version": "5.4.0-1005.5", "binary_name": "linux-tools-5.4.0-1005-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-headers-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1040-oracle-dbgsym" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-modules-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-oracle-5.15-headers-5.15.0-1040" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-oracle-5.15-tools-5.15.0-1040" }, { "binary_version": "5.15.0-1040.46~20.04.1", "binary_name": "linux-tools-5.15.0-1040-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1007.7", "binary_name": "linux-buildinfo-5.4.0-1007-raspi" }, { "binary_version": "5.4.0-1007.7", "binary_name": "linux-headers-5.4.0-1007-raspi" }, { "binary_version": "5.4.0-1007.7", "binary_name": "linux-image-5.4.0-1007-raspi" }, { "binary_version": "5.4.0-1007.7", "binary_name": "linux-image-5.4.0-1007-raspi-dbgsym" }, { "binary_version": "5.4.0-1007.7", "binary_name": "linux-modules-5.4.0-1007-raspi" }, { "binary_version": "5.4.0-1007.7", "binary_name": "linux-raspi-headers-5.4.0-1007" }, { "binary_version": "5.4.0-1007.7", "binary_name": "linux-raspi-tools-5.4.0-1007" }, { "binary_version": "5.4.0-1007.7", "binary_name": "linux-tools-5.4.0-1007-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-buildinfo-5.15.0-1038-generic" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-headers-5.15.0-1038-generic" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-image-5.15.0-1038-generic" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-image-5.15.0-1038-generic-dbgsym" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-modules-5.15.0-1038-generic" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-modules-extra-5.15.0-1038-generic" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-riscv-5.15-headers-5.15.0-1038" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-riscv-5.15-tools-5.15.0-1038" }, { "binary_version": "5.15.0-1038.42~20.04.2", "binary_name": "linux-tools-5.15.0-1038-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1020.24", "binary_name": "linux-buildinfo-5.4.0-1020-xilinx-zynqmp" }, { "binary_version": "5.4.0-1020.24", "binary_name": "linux-headers-5.4.0-1020-xilinx-zynqmp" }, { "binary_version": "5.4.0-1020.24", "binary_name": "linux-image-5.4.0-1020-xilinx-zynqmp" }, { "binary_version": "5.4.0-1020.24", "binary_name": "linux-image-5.4.0-1020-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.4.0-1020.24", "binary_name": "linux-modules-5.4.0-1020-xilinx-zynqmp" }, { "binary_version": "5.4.0-1020.24", "binary_name": "linux-tools-5.4.0-1020-xilinx-zynqmp" }, { "binary_version": "5.4.0-1020.24", "binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1020" }, { "binary_version": "5.4.0-1020.24", "binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1020" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-aws-fips-headers-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-aws-fips-tools-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-buildinfo-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-headers-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips-dbgsym" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-modules-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-modules-extra-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-tools-5.4.0-1021-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-azure-fips-headers-5.4.0-1022" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-azure-fips-tools-5.4.0-1022" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-buildinfo-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-headers-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips-dbgsym" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-modules-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-modules-extra-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-tools-5.4.0-1022-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1026.30", "binary_name": "linux-buildinfo-5.4.0-1026-fips" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-fips-headers-5.4.0-1026" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-fips-tools-5.4.0-1026" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-fips-tools-host" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-headers-5.4.0-1026-fips" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-image-unsigned-5.4.0-1026-fips" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-image-unsigned-5.4.0-1026-fips-dbgsym" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-image-unsigned-hmac-5.4.0-1026-fips" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-modules-5.4.0-1026-fips" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-modules-extra-5.4.0-1026-fips" }, { "binary_version": "5.4.0-1026.30", "binary_name": "linux-tools-5.4.0-1026-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-gcp-fips-headers-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-gcp-fips-tools-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-headers-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips-dbgsym" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-modules-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-tools-5.4.0-1021-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-aws-fips-headers-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-aws-fips-tools-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-buildinfo-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-headers-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips-dbgsym" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-modules-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-modules-extra-5.4.0-1021-aws-fips" }, { "binary_version": "5.4.0-1021.21+fips2", "binary_name": "linux-tools-5.4.0-1021-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-azure-fips-headers-5.4.0-1022" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-azure-fips-tools-5.4.0-1022" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-buildinfo-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-headers-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips-dbgsym" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-modules-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-modules-extra-5.4.0-1022-azure-fips" }, { "binary_version": "5.4.0-1022.22+fips1", "binary_name": "linux-tools-5.4.0-1022-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1007.8", "binary_name": "linux-buildinfo-5.4.0-1007-fips" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-fips-headers-5.4.0-1007" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-fips-tools-5.4.0-1007" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-fips-tools-host" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-headers-5.4.0-1007-fips" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-image-unsigned-5.4.0-1007-fips" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-image-unsigned-5.4.0-1007-fips-dbgsym" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-image-unsigned-hmac-5.4.0-1007-fips" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-modules-5.4.0-1007-fips" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-modules-extra-5.4.0-1007-fips" }, { "binary_version": "5.4.0-1007.8", "binary_name": "linux-tools-5.4.0-1007-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-gcp-fips-headers-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-gcp-fips-tools-5.4.0-1021" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-headers-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips-dbgsym" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-modules-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips" }, { "binary_version": "5.4.0-1021.21+fips1", "binary_name": "linux-tools-5.4.0-1021-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-79.86", "binary_name": "linux-buildinfo-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-buildinfo-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-buildinfo-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-cloud-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-cloud-tools-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-doc" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-headers-5.15.0-79" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-headers-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-headers-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-headers-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-5.15.0-79-generic-dbgsym" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-5.15.0-79-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-unsigned-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-unsigned-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-unsigned-5.15.0-79-generic-64k-dbgsym" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-image-unsigned-5.15.0-79-generic-dbgsym" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-libc-dev" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-modules-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-modules-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-modules-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-modules-extra-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-modules-iwlwifi-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-source-5.15.0" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-tools-5.15.0-79-generic" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-tools-5.15.0-79-generic-64k" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-tools-5.15.0-79-generic-lpae" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-tools-common" }, { "binary_version": "5.15.0-79.86", "binary_name": "linux-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1042.47", "binary_name": "linux-aws-cloud-tools-5.15.0-1042" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-aws-headers-5.15.0-1042" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-aws-tools-5.15.0-1042" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-buildinfo-5.15.0-1042-aws" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-cloud-tools-5.15.0-1042-aws" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-headers-5.15.0-1042-aws" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-image-unsigned-5.15.0-1042-aws" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-image-unsigned-5.15.0-1042-aws-dbgsym" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-modules-5.15.0-1042-aws" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-modules-extra-5.15.0-1042-aws" }, { "binary_version": "5.15.0-1042.47", "binary_name": "linux-tools-5.15.0-1042-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1008" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-aws-6.5-headers-6.5.0-1008" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-aws-6.5-tools-6.5.0-1008" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-headers-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1008-aws-dbgsym" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-modules-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8~22.04.1", "binary_name": "linux-tools-6.5.0-1008-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-aws-6.8-headers-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-aws-6.8-tools-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-buildinfo-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-cloud-tools-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-headers-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1009-aws-dbgsym" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-modules-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-modules-extra-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-modules-iwlwifi-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-tools-6.8.0-1009-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1044.51", "binary_name": "linux-azure-cloud-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-azure-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-azure-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-buildinfo-5.15.0-1044-azure" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-cloud-tools-5.15.0-1044-azure" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-headers-5.15.0-1044-azure" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-image-unsigned-5.15.0-1044-azure" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-image-unsigned-5.15.0-1044-azure-dbgsym" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-modules-5.15.0-1044-azure" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-modules-extra-5.15.0-1044-azure" }, { "binary_version": "5.15.0-1044.51", "binary_name": "linux-tools-5.15.0-1044-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-azure-6.5-headers-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-azure-6.5-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-headers-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1007-azure-dbgsym" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-modules-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7~22.04.1", "binary_name": "linux-tools-6.5.0-1007-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-azure-6.8-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-azure-6.8-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-headers-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-azure-dbgsym" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-tools-6.8.0-1008-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1044.51.1", "binary_name": "linux-image-unsigned-5.15.0-1044-azure-fde" }, { "binary_version": "5.15.0-1044.51.1", "binary_name": "linux-image-unsigned-5.15.0-1044-azure-fde-dbgsym" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1039.47", "binary_name": "linux-buildinfo-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-gcp-headers-5.15.0-1039" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-gcp-tools-5.15.0-1039" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-headers-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-image-unsigned-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-image-unsigned-5.15.0-1039-gcp-dbgsym" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-modules-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-modules-extra-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-modules-iwlwifi-5.15.0-1039-gcp" }, { "binary_version": "5.15.0-1039.47", "binary_name": "linux-tools-5.15.0-1039-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-buildinfo-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-gcp-6.5-headers-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-gcp-6.5-tools-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-headers-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-image-unsigned-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-image-unsigned-6.5.0-1010-gcp-dbgsym" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-modules-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-modules-extra-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-modules-iwlwifi-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-tools-6.5.0-1010-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-gcp-6.8-headers-6.8.0-1010" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-gcp-6.8-tools-6.8.0-1010" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-headers-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1010-gcp-dbgsym" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-modules-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-tools-6.8.0-1010-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1039.44", "binary_name": "linux-buildinfo-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-gke-headers-5.15.0-1039" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-gke-tools-5.15.0-1039" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-headers-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-image-unsigned-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-image-unsigned-5.15.0-1039-gke-dbgsym" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-modules-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-modules-extra-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-tools-5.15.0-1039-gke" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1025.30", "binary_name": "linux-buildinfo-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-cloud-tools-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-gkeop-cloud-tools-5.15.0-1025" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-gkeop-headers-5.15.0-1025" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-gkeop-tools-5.15.0-1025" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-headers-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-image-unsigned-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-image-unsigned-5.15.0-1025-gkeop-dbgsym" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-modules-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-modules-extra-5.15.0-1025-gkeop" }, { "binary_version": "5.15.0-1025.30", "binary_name": "linux-tools-5.15.0-1025-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-headers-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-headers-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-cloud-tools-common" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-headers-6.5.0-14" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-tools-common" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-tools-host" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-6.5.0-14-generic-dbgsym" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic-64k-dbgsym" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic-dbgsym" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-extra-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-ipu6-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-ivsc-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-source-6.5.0" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-tools-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-tools-6.5.0-14-generic-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-buildinfo-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-buildinfo-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-headers-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-headers-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-hwe-6.8-headers-6.8.0-38" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-hwe-6.8-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-6.8.0-38-generic-dbgsym" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic-64k-dbgsym" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic-dbgsym" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-extra-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-ipu6-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-usbio-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-tools-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-tools-6.8.0-38-generic-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1035.38", "binary_name": "linux-buildinfo-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-headers-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-ibm-headers-5.15.0-1035" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-ibm-source-5.15.0" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-ibm-tools-5.15.0-1035" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-image-unsigned-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-image-unsigned-5.15.0-1035-ibm-dbgsym" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-modules-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-modules-extra-5.15.0-1035-ibm" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-tools-5.15.0-1035-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1037.42", "binary_name": "linux-buildinfo-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-cloud-tools-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-headers-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-image-unsigned-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-image-unsigned-5.15.0-1037-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1037" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-intel-iotg-cloud-tools-common" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-intel-iotg-headers-5.15.0-1037" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-intel-iotg-tools-5.15.0-1037" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-intel-iotg-tools-common" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-intel-iotg-tools-host" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-modules-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-modules-extra-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-modules-iwlwifi-5.15.0-1037-intel-iotg" }, { "binary_version": "5.15.0-1037.42", "binary_name": "linux-tools-5.15.0-1037-intel-iotg" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1039.44", "binary_name": "linux-buildinfo-5.15.0-1039-kvm" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-headers-5.15.0-1039-kvm" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-image-unsigned-5.15.0-1039-kvm" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-image-unsigned-5.15.0-1039-kvm-dbgsym" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-kvm-headers-5.15.0-1039" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-kvm-tools-5.15.0-1039" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-modules-5.15.0-1039-kvm" }, { "binary_version": "5.15.0-1039.44", "binary_name": "linux-tools-5.15.0-1039-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-79.88", "binary_name": "linux-buildinfo-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-buildinfo-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-cloud-tools-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-headers-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-headers-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-image-unsigned-5.15.0-79-lowlatency-dbgsym" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-lowlatency-cloud-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-lowlatency-cloud-tools-common" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-lowlatency-headers-5.15.0-79" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-lowlatency-tools-5.15.0-79" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-lowlatency-tools-common" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-lowlatency-tools-host" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-modules-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-modules-5.15.0-79-lowlatency-64k" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-modules-iwlwifi-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-tools-5.15.0-79-lowlatency" }, { "binary_version": "5.15.0-79.88", "binary_name": "linux-tools-5.15.0-79-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-headers-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-headers-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency-64k-dbgsym" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency-dbgsym" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-14" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-common" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-host" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-modules-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-modules-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-tools-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-tools-6.5.0-14-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-buildinfo-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-buildinfo-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-cloud-tools-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-headers-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-headers-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-dbgsym" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-modules-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-modules-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-modules-iwlwifi-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-tools-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-tools-6.8.0-38-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1030.30", "binary_name": "linux-buildinfo-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-buildinfo-5.15.0-1030-nvidia-lowlatency" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-cloud-tools-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-cloud-tools-5.15.0-1030-nvidia-lowlatency" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-headers-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-headers-5.15.0-1030-nvidia-lowlatency" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-image-unsigned-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-image-unsigned-5.15.0-1030-nvidia-dbgsym" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-image-unsigned-5.15.0-1030-nvidia-lowlatency" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-image-unsigned-5.15.0-1030-nvidia-lowlatency-dbgsym" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-modules-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-modules-5.15.0-1030-nvidia-lowlatency" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-modules-extra-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-modules-nvidia-fs-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-modules-nvidia-fs-5.15.0-1030-nvidia-lowlatency" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-nvidia-cloud-tools-5.15.0-1030" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-nvidia-cloud-tools-common" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-nvidia-headers-5.15.0-1030" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-nvidia-tools-5.15.0-1030" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-nvidia-tools-common" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-nvidia-tools-host" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-tools-5.15.0-1030-nvidia" }, { "binary_version": "5.15.0-1030.30", "binary_name": "linux-tools-5.15.0-1030-nvidia-lowlatency" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-buildinfo-6.2.0-1003-nvidia" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-buildinfo-6.2.0-1003-nvidia-64k" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-cloud-tools-6.2.0-1003-nvidia" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-headers-6.2.0-1003-nvidia" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-headers-6.2.0-1003-nvidia-64k" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1003-nvidia" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1003-nvidia-64k" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1003-nvidia-64k-dbgsym" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1003-nvidia-dbgsym" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-modules-6.2.0-1003-nvidia" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-modules-6.2.0-1003-nvidia-64k" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-modules-extra-6.2.0-1003-nvidia" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-nvidia-6.2-cloud-tools-6.2.0-1003" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-nvidia-6.2-cloud-tools-common" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-nvidia-6.2-headers-6.2.0-1003" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-nvidia-6.2-tools-6.2.0-1003" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-nvidia-6.2-tools-common" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-nvidia-6.2-tools-host" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-tools-6.2.0-1003-nvidia" }, { "binary_version": "6.2.0-1003.3~22.04.1", "binary_name": "linux-tools-6.2.0-1003-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1004.4", "binary_name": "linux-buildinfo-6.5.0-1004-nvidia" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-buildinfo-6.5.0-1004-nvidia-64k" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-headers-6.5.0-1004-nvidia" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-headers-6.5.0-1004-nvidia-64k" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-image-unsigned-6.5.0-1004-nvidia" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-image-unsigned-6.5.0-1004-nvidia-64k" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-image-unsigned-6.5.0-1004-nvidia-64k-dbgsym" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-image-unsigned-6.5.0-1004-nvidia-dbgsym" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-modules-6.5.0-1004-nvidia" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-modules-6.5.0-1004-nvidia-64k" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-modules-extra-6.5.0-1004-nvidia" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-nvidia-6.5-headers-6.5.0-1004" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-nvidia-6.5-tools-6.5.0-1004" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-nvidia-6.5-tools-host" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-tools-6.5.0-1004-nvidia" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-tools-6.5.0-1004-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-headers-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-headers-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-dbgsym" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-nvidia-6.8-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-nvidia-6.8-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-nvidia-6.8-tools-host" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-tools-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-tools-6.8.0-1008-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.0.0-1021.21", "binary_name": "linux-buildinfo-6.0.0-1021-oem" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-headers-6.0.0-1021-oem" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-image-unsigned-6.0.0-1021-oem" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-image-unsigned-6.0.0-1021-oem-dbgsym" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-modules-6.0.0-1021-oem" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-modules-ipu6-6.0.0-1021-oem" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-modules-ivsc-6.0.0-1021-oem" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-modules-iwlwifi-6.0.0-1021-oem" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-oem-6.0-headers-6.0.0-1021" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-oem-6.0-tools-6.0.0-1021" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-oem-6.0-tools-host" }, { "binary_version": "6.0.0-1021.21", "binary_name": "linux-tools-6.0.0-1021-oem" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.1.0-1009.9", "binary_name": "linux-buildinfo-6.1.0-1009-oem" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-headers-6.1.0-1009-oem" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-image-unsigned-6.1.0-1009-oem" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-image-unsigned-6.1.0-1009-oem-dbgsym" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-modules-6.1.0-1009-oem" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-modules-ipu6-6.1.0-1009-oem" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-modules-ivsc-6.1.0-1009-oem" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-oem-6.1-headers-6.1.0-1009" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-oem-6.1-tools-6.1.0-1009" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-oem-6.1-tools-host" }, { "binary_version": "6.1.0-1009.9", "binary_name": "linux-tools-6.1.0-1009-oem" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1003.3", "binary_name": "linux-buildinfo-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-headers-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-image-unsigned-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-image-unsigned-6.5.0-1003-oem-dbgsym" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-modules-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-modules-ipu6-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-modules-ivsc-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-modules-iwlwifi-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-oem-6.5-headers-6.5.0-1003" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-oem-6.5-lib-rust-6.5.0-1003-oem" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-oem-6.5-tools-6.5.0-1003" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-oem-6.5-tools-host" }, { "binary_version": "6.5.0-1003.3", "binary_name": "linux-tools-6.5.0-1003-oem" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1040.46", "binary_name": "linux-buildinfo-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-headers-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-image-unsigned-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-image-unsigned-5.15.0-1040-oracle-dbgsym" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-modules-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-modules-extra-5.15.0-1040-oracle" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-oracle-headers-5.15.0-1040" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-oracle-tools-5.15.0-1040" }, { "binary_version": "5.15.0-1040.46", "binary_name": "linux-tools-5.15.0-1040-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-buildinfo-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-headers-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-image-unsigned-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-image-unsigned-6.5.0-1013-oracle-dbgsym" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-modules-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-modules-extra-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-modules-iwlwifi-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-oracle-6.5-headers-6.5.0-1013" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-oracle-6.5-tools-6.5.0-1013" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-tools-6.5.0-1013-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-buildinfo-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-buildinfo-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-headers-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-headers-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-dbgsym" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-extra-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-extra-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-iwlwifi-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-oracle-6.8-headers-6.8.0-1006" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-oracle-6.8-tools-6.8.0-1006" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-tools-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-tools-6.8.0-1006-oracle-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1035.38", "binary_name": "linux-buildinfo-5.15.0-1035-raspi" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-headers-5.15.0-1035-raspi" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-image-5.15.0-1035-raspi" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-image-5.15.0-1035-raspi-dbgsym" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-modules-5.15.0-1035-raspi" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-modules-extra-5.15.0-1035-raspi" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-raspi-headers-5.15.0-1035" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-raspi-tools-5.15.0-1035" }, { "binary_version": "5.15.0-1035.38", "binary_name": "linux-tools-5.15.0-1035-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-headers-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-image-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-image-6.5.0-17-generic-dbgsym" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-modules-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-modules-extra-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-riscv-6.5-headers-6.5.0-17" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-riscv-6.5-tools-6.5.0-17" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-tools-6.5.0-17-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-buildinfo-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-headers-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-image-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-image-6.8.0-38-generic-dbgsym" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-modules-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-riscv-6.8-headers-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-riscv-6.8-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-tools-6.8.0-38-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-headers-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-image-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-image-6.5.0-1007-starfive-dbgsym" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-modules-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-starfive-6.5-headers-6.5.0-1007" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-starfive-6.5-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-tools-6.5.0-1007-starfive" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1025.29", "binary_name": "linux-buildinfo-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-headers-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-image-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-image-5.15.0-1025-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-modules-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-tools-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1025" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1025" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-tools-common" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-aws-fips-headers-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-aws-fips-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-buildinfo-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-cloud-tools-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-headers-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips-dbgsym" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-modules-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-modules-extra-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-tools-5.15.0-1051-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-azure-fips-headers-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-azure-fips-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-buildinfo-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-cloud-tools-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-headers-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips-dbgsym" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-modules-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-modules-extra-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-tools-5.15.0-1053-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-headers-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips-dbgsym" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-tools-5.15.0-1048-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1052" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-aws-fips-headers-5.15.0-1052" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-aws-fips-tools-5.15.0-1052" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-buildinfo-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-cloud-tools-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-headers-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-image-unsigned-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-image-unsigned-5.15.0-1052-aws-fips-dbgsym" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-modules-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-modules-extra-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-tools-5.15.0-1052-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1058" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-azure-fips-headers-5.15.0-1058" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-azure-fips-tools-5.15.0-1058" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-buildinfo-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-cloud-tools-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-headers-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips-dbgsym" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-modules-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-modules-extra-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-modules-iwlwifi-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-tools-5.15.0-1058-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-buildinfo-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-fips-headers-5.15.0-92" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-fips-tools-5.15.0-92" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-fips-tools-host" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-headers-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-image-unsigned-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-image-unsigned-5.15.0-92-fips-dbgsym" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-modules-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-modules-extra-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-modules-iwlwifi-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-tools-5.15.0-92-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-headers-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips-dbgsym" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-tools-5.15.0-1048-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "low", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-31.31", "binary_name": "linux-buildinfo-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-buildinfo-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-cloud-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-cloud-tools-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-doc" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-headers-6.8.0-31" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-headers-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-headers-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-6.8.0-31-generic-dbgsym" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic-64k-dbgsym" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic-dbgsym" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-lib-rust-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-libc-dev" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-extra-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-ipu6-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-ivsc-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-iwlwifi-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-source-6.8.0" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-common" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1008.8", "binary_name": "linux-aws-cloud-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-aws-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-aws-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-buildinfo-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-cloud-tools-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-headers-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-image-unsigned-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-image-unsigned-6.8.0-1008-aws-dbgsym" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-modules-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-modules-extra-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-tools-6.8.0-1008-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1007.7", "binary_name": "linux-azure-cloud-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-azure-headers-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-azure-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-cloud-tools-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-azure-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-extra-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-iwlwifi-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-gcp-headers-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-gcp-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-gcp-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-extra-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-iwlwifi-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-buildinfo-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-buildinfo-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-cloud-tools-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-headers-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-headers-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-dbgsym" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-cloud-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-cloud-tools-common" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-headers-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-lib-rust-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-tools-common" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-tools-host" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-iwlwifi-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-tools-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-tools-6.8.0-31-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1005.5", "binary_name": "linux-buildinfo-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-buildinfo-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-headers-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-headers-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-dbgsym" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-extra-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-extra-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-iwlwifi-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-oracle-headers-6.8.0-1005" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-oracle-tools-6.8.0-1005" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-tools-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-tools-6.8.0-1005-oracle-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1004.4", "binary_name": "linux-buildinfo-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-headers-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-image-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-image-6.8.0-1004-raspi-dbgsym" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-modules-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-raspi-headers-6.8.0-1004" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-raspi-tools-6.8.0-1004" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-tools-6.8.0-1004-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.11.0-1001.1", "binary_name": "linux-buildinfo-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-cloud-tools-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-headers-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-image-unsigned-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-image-unsigned-6.11.0-1001-realtime-dbgsym" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-modules-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-modules-extra-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-modules-iwlwifi-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-realtime-cloud-tools-6.11.0-1001" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-realtime-headers-6.11.0-1001" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-realtime-tools-6.11.0-1001" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-tools-6.11.0-1001-realtime" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-buildinfo-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-headers-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-6.8.0-31-generic-dbgsym" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-riscv-headers-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-riscv-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-tools-6.8.0-31-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-9.9", "binary_name": "linux-buildinfo-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-buildinfo-6.5.0-9-generic-64k" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-cloud-tools-6.5.0-9" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-cloud-tools-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-doc" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-headers-6.5.0-9" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-headers-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-headers-6.5.0-9-generic-64k" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-image-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-image-6.5.0-9-generic-dbgsym" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-image-unsigned-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-image-unsigned-6.5.0-9-generic-64k" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-image-unsigned-6.5.0-9-generic-64k-dbgsym" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-image-unsigned-6.5.0-9-generic-dbgsym" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-lib-rust-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-libc-dev" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-modules-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-modules-6.5.0-9-generic-64k" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-modules-extra-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-modules-ipu6-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-modules-ivsc-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-modules-iwlwifi-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-source-6.5.0" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-tools-6.5.0-9" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-tools-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-tools-6.5.0-9-generic-64k" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-tools-common" }, { "binary_version": "6.5.0-9.9", "binary_name": "linux-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1008.8", "binary_name": "linux-aws-cloud-tools-6.5.0-1008" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-aws-headers-6.5.0-1008" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-aws-tools-6.5.0-1008" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-buildinfo-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-cloud-tools-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-headers-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-image-unsigned-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-image-unsigned-6.5.0-1008-aws-dbgsym" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-modules-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-modules-extra-6.5.0-1008-aws" }, { "binary_version": "6.5.0-1008.8", "binary_name": "linux-tools-6.5.0-1008-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1007.7", "binary_name": "linux-azure-cloud-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-azure-headers-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-azure-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-buildinfo-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-cloud-tools-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-headers-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-azure-dbgsym" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-extra-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-iwlwifi-6.5.0-1007-azure" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-tools-6.5.0-1007-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1007.7", "binary_name": "linux-buildinfo-6.5.0-1007-gcp" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-gcp-headers-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-gcp-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-headers-6.5.0-1007-gcp" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-gcp" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-gcp-dbgsym" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-6.5.0-1007-gcp" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-extra-6.5.0-1007-gcp" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-iwlwifi-6.5.0-1007-gcp" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-tools-6.5.0-1007-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1003.5", "binary_name": "linux-buildinfo-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-gke-headers-6.8.0-1003" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-gke-tools-6.8.0-1003" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-headers-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-image-unsigned-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-image-unsigned-6.8.0-1003-gke-dbgsym" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-modules-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-modules-extra-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-tools-6.8.0-1003-gke" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1001.3", "binary_name": "linux-buildinfo-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-cloud-tools-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-gkeop-cloud-tools-6.8.0-1001" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-gkeop-headers-6.8.0-1001" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-gkeop-tools-6.8.0-1001" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-headers-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop-dbgsym" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-modules-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-modules-extra-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-tools-6.8.0-1001-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1009.9", "binary_name": "linux-buildinfo-6.5.0-1009-ibm" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-headers-6.5.0-1009-ibm" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-ibm-headers-6.5.0-1009" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-ibm-source-6.5.0" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-ibm-tools-6.5.0-1009" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-image-unsigned-6.5.0-1009-ibm" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-image-unsigned-6.5.0-1009-ibm-dbgsym" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-modules-6.5.0-1009-ibm" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-modules-extra-6.5.0-1009-ibm" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-modules-iwlwifi-6.5.0-1009-ibm" }, { "binary_version": "6.5.0-1009.9", "binary_name": "linux-tools-6.5.0-1009-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-buildinfo-6.5.0-9-lowlatency" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-buildinfo-6.5.0-9-lowlatency-64k" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-cloud-tools-6.5.0-9-lowlatency" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-headers-6.5.0-9-lowlatency" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-headers-6.5.0-9-lowlatency-64k" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency-64k" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency-64k-dbgsym" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-image-unsigned-6.5.0-9-lowlatency-dbgsym" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-lowlatency-cloud-tools-6.5.0-9" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-lowlatency-cloud-tools-common" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-lowlatency-headers-6.5.0-9" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-lowlatency-tools-6.5.0-9" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-lowlatency-tools-common" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-lowlatency-tools-host" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-modules-6.5.0-9-lowlatency" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-modules-6.5.0-9-lowlatency-64k" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-modules-iwlwifi-6.5.0-9-lowlatency" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-tools-6.5.0-9-lowlatency" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-tools-6.5.0-9-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-extra-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-nvidia-fs-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-nvidia-fs-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-nvidia-headers-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-nvidia-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-nvidia-tools-host" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-buildinfo-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-buildinfo-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-headers-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-headers-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-dbgsym" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-extra-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-nvidia-lowlatency-tools-host" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-tools-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-tools-6.8.0-1009-nvidia-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1003.3", "binary_name": "linux-buildinfo-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-headers-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-image-unsigned-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-image-unsigned-6.8.0-1003-oem-dbgsym" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-ipu6-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-ivsc-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-iwlwifi-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-oem-6.8-headers-6.8.0-1003" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-oem-6.8-tools-6.8.0-1003" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-tools-6.8.0-1003-oem" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1010.10", "binary_name": "linux-buildinfo-6.5.0-1010-oracle" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-headers-6.5.0-1010-oracle" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-image-unsigned-6.5.0-1010-oracle" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-image-unsigned-6.5.0-1010-oracle-dbgsym" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-modules-6.5.0-1010-oracle" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-modules-extra-6.5.0-1010-oracle" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-modules-iwlwifi-6.5.0-1010-oracle" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-oracle-headers-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-oracle-tools-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10", "binary_name": "linux-tools-6.5.0-1010-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-1005.7", "binary_name": "linux-buildinfo-6.5.0-1005-raspi" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-headers-6.5.0-1005-raspi" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-image-6.5.0-1005-raspi" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-image-6.5.0-1005-raspi-dbgsym" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-modules-6.5.0-1005-raspi" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-modules-extra-6.5.0-1005-raspi" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-raspi-headers-6.5.0-1005" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-raspi-tools-6.5.0-1005" }, { "binary_version": "6.5.0-1005.7", "binary_name": "linux-tools-6.5.0-1005-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-buildinfo-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-headers-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-image-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-image-6.5.0-9-generic-dbgsym" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-modules-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-modules-extra-6.5.0-9-generic" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-riscv-headers-6.5.0-9" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-riscv-tools-6.5.0-9" }, { "binary_version": "6.5.0-9.9.1", "binary_name": "linux-tools-6.5.0-9-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.7.0-2001.1", "binary_name": "linux-buildinfo-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-headers-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-image-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-image-6.7.0-2001-raspi-realtime-dbgsym" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-modules-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-raspi-realtime-headers-6.7.0-2001" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-raspi-realtime-tools-6.7.0-2001" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-tools-6.7.0-2001-raspi-realtime" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "6.8.0-1008.19", "binary_name": "linux-buildinfo-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-cloud-tools-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-headers-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-image-unsigned-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-image-unsigned-6.8.0-1008-realtime-dbgsym" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-modules-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-modules-extra-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-modules-iwlwifi-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-realtime-cloud-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-realtime-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-realtime-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-tools-6.8.0-1008-realtime" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }