A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perfreadgroup() is called while an event's siblinglist is smaller than its child's siblinglist, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.11.0-12.19", "binary_name": "block-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "block-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "crypto-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "crypto-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fat-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fat-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fb-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "firewire-core-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "floppy-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-core-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-core-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-secondary-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "fs-secondary-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "input-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "input-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ipmi-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ipmi-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "irda-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "irda-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "kernel-image-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "kernel-image-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-doc" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-headers-3.11.0-12" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-headers-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-headers-3.11.0-12-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-image-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-image-3.11.0-12-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-image-extra-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-libc-dev" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-source-3.11.0" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-3.11.0-12" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-3.11.0-12-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-3.11.0-12-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-tools-common" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-udebs-generic" }, { "binary_version": "3.11.0-12.19", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "3.11.0-12.19", "binary_name": "md-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "md-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "message-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "mouse-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "mouse-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "multipath-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "multipath-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nfs-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nfs-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-pcmcia-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-shared-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-shared-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-usb-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "nic-usb-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "parport-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "parport-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "pata-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "pcmcia-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "pcmcia-storage-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "plip-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "plip-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ppp-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "ppp-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "sata-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "sata-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "scsi-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "scsi-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "serial-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "speakup-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "speakup-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "squashfs-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "squashfs-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "storage-core-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "storage-core-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "usb-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "usb-modules-3.11.0-12-generic-lpae-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "virtio-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "vlan-modules-3.11.0-12-generic-di" }, { "binary_version": "3.11.0-12.19", "binary_name": "vlan-modules-3.11.0-12-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.4.0-1125.131", "binary_name": "linux-aws-cloud-tools-4.4.0-1125" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-aws-headers-4.4.0-1125" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-aws-tools-4.4.0-1125" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-buildinfo-4.4.0-1125-aws" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-cloud-tools-4.4.0-1125-aws" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-headers-4.4.0-1125-aws" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-image-4.4.0-1125-aws" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-image-4.4.0-1125-aws-dbgsym" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-modules-4.4.0-1125-aws" }, { "binary_version": "4.4.0-1125.131", "binary_name": "linux-tools-4.4.0-1125-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-azure-headers-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-azure-tools-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-buildinfo-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-cloud-tools-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-headers-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1172-azure-dbgsym" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-modules-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-modules-extra-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~14.04.1", "binary_name": "linux-tools-4.15.0-1172-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "block-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "crypto-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "fat-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "fb-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "firewire-core-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "floppy-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "fs-core-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "input-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "ipmi-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "irda-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "kernel-image-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-buildinfo-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-buildinfo-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-headers-4.4.0-248" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-headers-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-headers-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-image-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-image-4.4.0-248-generic-dbgsym" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-248-generic-dbgsym" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-image-unsigned-4.4.0-248-lowlatency-dbgsym" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-248" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-lts-xenial-tools-4.4.0-248" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-lts-xenial-udebs-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-modules-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-modules-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-modules-extra-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-tools-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "linux-tools-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "md-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "message-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "mouse-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "multipath-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "nfs-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "nic-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "nic-pcmcia-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "nic-shared-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "nic-usb-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "parport-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "pata-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "pcmcia-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "pcmcia-storage-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "plip-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "ppp-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "sata-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "scsi-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "serial-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "speakup-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "storage-core-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "usb-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "virtio-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282~14.04.1", "binary_name": "vlan-modules-4.4.0-248-generic-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.4.0-248.282", "binary_name": "block-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "crypto-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "dasd-extra-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "dasd-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "fat-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "fb-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "firewire-core-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "floppy-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "fs-core-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "fs-secondary-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "input-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "ipmi-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "irda-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "kernel-image-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-buildinfo-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-buildinfo-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-cloud-tools-4.4.0-248" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-cloud-tools-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-cloud-tools-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-doc" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-headers-4.4.0-248" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-headers-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-headers-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-image-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-image-4.4.0-248-generic-dbgsym" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-image-unsigned-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-image-unsigned-4.4.0-248-generic-dbgsym" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-image-unsigned-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-image-unsigned-4.4.0-248-lowlatency-dbgsym" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-libc-dev" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-modules-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-modules-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-modules-extra-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-source-4.4.0" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-tools-4.4.0-248" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-tools-4.4.0-248-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-tools-4.4.0-248-lowlatency" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-tools-common" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-tools-host" }, { "binary_version": "4.4.0-248.282", "binary_name": "linux-udebs-generic" }, { "binary_version": "4.4.0-248.282", "binary_name": "md-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "message-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "mouse-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "multipath-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "nfs-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "nic-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "nic-pcmcia-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "nic-shared-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "nic-usb-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "parport-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "pata-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "pcmcia-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "pcmcia-storage-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "plip-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "ppp-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "sata-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "scsi-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "serial-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "speakup-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "storage-core-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "usb-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "virtio-modules-4.4.0-248-generic-di" }, { "binary_version": "4.4.0-248.282", "binary_name": "vlan-modules-4.4.0-248-generic-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.4.0-1163.178", "binary_name": "linux-aws-cloud-tools-4.4.0-1163" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-aws-headers-4.4.0-1163" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-aws-tools-4.4.0-1163" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-buildinfo-4.4.0-1163-aws" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-cloud-tools-4.4.0-1163-aws" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-headers-4.4.0-1163-aws" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-image-4.4.0-1163-aws" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-image-4.4.0-1163-aws-dbgsym" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-modules-4.4.0-1163-aws" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-modules-extra-4.4.0-1163-aws" }, { "binary_version": "4.4.0-1163.178", "binary_name": "linux-tools-4.4.0-1163-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-aws-headers-4.15.0-1163" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1163" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-aws-hwe-tools-4.15.0-1163" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-headers-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1163-aws-dbgsym" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-modules-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176~16.04.1", "binary_name": "linux-tools-4.15.0-1163-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-azure-headers-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-azure-tools-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-headers-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1172-azure-dbgsym" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-modules-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187~16.04.1", "binary_name": "linux-tools-4.15.0-1172-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-gcp-headers-4.15.0-1157" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-gcp-tools-4.15.0-1157" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-headers-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1157-gcp-dbgsym" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-modules-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174~16.04.1", "binary_name": "linux-tools-4.15.0-1157-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "block-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "crypto-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "dasd-extra-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "dasd-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "fat-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "fb-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "firewire-core-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "floppy-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "fs-core-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "fs-secondary-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "input-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "ipmi-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "irda-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "kernel-image-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-buildinfo-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-buildinfo-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-headers-4.15.0-220" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-headers-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-headers-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-hwe-cloud-tools-4.15.0-220" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-hwe-tools-4.15.0-220" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-hwe-udebs-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-image-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-image-4.15.0-220-generic-dbgsym" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-220-generic-dbgsym" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-220-lowlatency-dbgsym" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-modules-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-modules-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-modules-extra-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-source-4.15.0" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-tools-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "linux-tools-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "md-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "message-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "mouse-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "multipath-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "nfs-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "nic-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "nic-pcmcia-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "nic-shared-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "nic-usb-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "parport-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "pata-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "pcmcia-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "pcmcia-storage-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "plip-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "ppp-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "sata-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "scsi-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "serial-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "storage-core-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "usb-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "virtio-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231~16.04.1", "binary_name": "vlan-modules-4.15.0-220-generic-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.4.0-1126.136", "binary_name": "linux-buildinfo-4.4.0-1126-kvm" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-cloud-tools-4.4.0-1126-kvm" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-headers-4.4.0-1126-kvm" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-image-4.4.0-1126-kvm" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-image-4.4.0-1126-kvm-dbgsym" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-kvm-cloud-tools-4.4.0-1126" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-kvm-headers-4.4.0-1126" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-kvm-tools-4.4.0-1126" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-modules-4.4.0-1126-kvm" }, { "binary_version": "4.4.0-1126.136", "binary_name": "linux-tools-4.4.0-1126-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-headers-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1126-oracle-dbgsym" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-modules-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-oracle-headers-4.15.0-1126" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-oracle-tools-4.15.0-1126" }, { "binary_version": "4.15.0-1126.137~16.04.1", "binary_name": "linux-tools-4.15.0-1126-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-220.231", "binary_name": "block-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "crypto-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "dasd-extra-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "dasd-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "fat-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "fb-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "firewire-core-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "floppy-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "fs-core-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "fs-secondary-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "input-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "ipmi-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "irda-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "kernel-image-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-buildinfo-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-buildinfo-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-cloud-tools-4.15.0-220" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-cloud-tools-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-cloud-tools-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-doc" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-headers-4.15.0-220" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-headers-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-headers-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-image-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-image-4.15.0-220-generic-dbgsym" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-image-unsigned-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-image-unsigned-4.15.0-220-generic-dbgsym" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-image-unsigned-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-image-unsigned-4.15.0-220-lowlatency-dbgsym" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-libc-dev" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-modules-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-modules-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-modules-extra-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-source-4.15.0" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-tools-4.15.0-220" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-tools-4.15.0-220-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-tools-4.15.0-220-lowlatency" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-tools-common" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-tools-host" }, { "binary_version": "4.15.0-220.231", "binary_name": "linux-udebs-generic" }, { "binary_version": "4.15.0-220.231", "binary_name": "md-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "message-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "mouse-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "multipath-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "nfs-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "nic-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "nic-pcmcia-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "nic-shared-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "nic-usb-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "parport-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "pata-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "pcmcia-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "pcmcia-storage-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "plip-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "ppp-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "sata-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "scsi-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "serial-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "storage-core-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "usb-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "virtio-modules-4.15.0-220-generic-di" }, { "binary_version": "4.15.0-220.231", "binary_name": "vlan-modules-4.15.0-220-generic-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1163.176", "binary_name": "linux-aws-cloud-tools-4.15.0-1163" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-aws-headers-4.15.0-1163" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-aws-tools-4.15.0-1163" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-buildinfo-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-cloud-tools-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-headers-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-image-unsigned-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-image-unsigned-4.15.0-1163-aws-dbgsym" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-modules-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-modules-extra-4.15.0-1163-aws" }, { "binary_version": "4.15.0-1163.176", "binary_name": "linux-tools-4.15.0-1163-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1116" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-aws-5.4-headers-5.4.0-1116" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-aws-5.4-tools-5.4.0-1116" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-headers-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1116-aws-dbgsym" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-modules-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126~18.04.1", "binary_name": "linux-tools-5.4.0-1116-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1172.187", "binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-azure-4.15-headers-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-azure-4.15-tools-4.15.0-1172" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-buildinfo-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-cloud-tools-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-headers-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-image-unsigned-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-image-unsigned-4.15.0-1172-azure-dbgsym" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-modules-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-modules-extra-4.15.0-1172-azure" }, { "binary_version": "4.15.0-1172.187", "binary_name": "linux-tools-4.15.0-1172-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1121" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-azure-5.4-headers-5.4.0-1121" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-azure-5.4-tools-5.4.0-1121" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-headers-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1121-azure-dbgsym" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-modules-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128~18.04.1", "binary_name": "linux-tools-5.4.0-1121-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1157.174", "binary_name": "linux-buildinfo-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-gcp-4.15-headers-4.15.0-1157" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-gcp-4.15-tools-4.15.0-1157" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-headers-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-image-unsigned-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-image-unsigned-4.15.0-1157-gcp-dbgsym" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-modules-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-modules-extra-4.15.0-1157-gcp" }, { "binary_version": "4.15.0-1157.174", "binary_name": "linux-tools-4.15.0-1157-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-gcp-5.4-headers-5.4.0-1120" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-gcp-5.4-tools-5.4.0-1120" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-headers-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1120-gcp-dbgsym" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-modules-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129~18.04.1", "binary_name": "linux-tools-5.4.0-1120-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "block-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "crypto-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "dasd-extra-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "dasd-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "fat-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "fb-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "firewire-core-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "floppy-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "fs-core-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "fs-secondary-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "input-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "ipmi-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "kernel-image-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-buildinfo-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-buildinfo-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-headers-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-headers-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-169" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-hwe-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-hwe-5.4-headers-5.4.0-169" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-hwe-5.4-source-5.4.0" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-hwe-5.4-tools-5.4.0-169" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-hwe-5.4-tools-common" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-hwe-5.4-udebs-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-169-generic-dbgsym" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-169-lowlatency-dbgsym" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-modules-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-modules-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-modules-extra-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-tools-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "linux-tools-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "md-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "message-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "mouse-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "multipath-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "nfs-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "nic-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "nic-pcmcia-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "nic-shared-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "nic-usb-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "parport-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "pata-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "pcmcia-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "pcmcia-storage-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "plip-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "ppp-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "sata-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "scsi-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "serial-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "storage-core-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "usb-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "virtio-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187~18.04.1", "binary_name": "vlan-modules-5.4.0-169-generic-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-headers-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-ibm-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-ibm-5.4-headers-5.4.0-1063" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-ibm-5.4-source-5.4.0" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-ibm-5.4-tools-5.4.0-1063" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-ibm-5.4-tools-common" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1063-ibm-dbgsym" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-modules-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68~18.04.1", "binary_name": "linux-tools-5.4.0-1063-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1147.152", "binary_name": "linux-buildinfo-4.15.0-1147-kvm" }, { "binary_version": "4.15.0-1147.152", "binary_name": "linux-headers-4.15.0-1147-kvm" }, { "binary_version": "4.15.0-1147.152", "binary_name": "linux-image-4.15.0-1147-kvm" }, { "binary_version": "4.15.0-1147.152", "binary_name": "linux-image-4.15.0-1147-kvm-dbgsym" }, { "binary_version": "4.15.0-1147.152", "binary_name": "linux-kvm-headers-4.15.0-1147" }, { "binary_version": "4.15.0-1147.152", "binary_name": "linux-kvm-tools-4.15.0-1147" }, { "binary_version": "4.15.0-1147.152", "binary_name": "linux-modules-4.15.0-1147-kvm" }, { "binary_version": "4.15.0-1147.152", "binary_name": "linux-tools-4.15.0-1147-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.15.0-1126.137", "binary_name": "linux-buildinfo-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-headers-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-image-unsigned-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-image-unsigned-4.15.0-1126-oracle-dbgsym" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-modules-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-modules-extra-4.15.0-1126-oracle" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-oracle-headers-4.15.0-1126" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-oracle-tools-4.15.0-1126" }, { "binary_version": "4.15.0-1126.137", "binary_name": "linux-tools-4.15.0-1126-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-headers-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1115-oracle-dbgsym" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-modules-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-oracle-5.4-headers-5.4.0-1115" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-oracle-5.4-tools-5.4.0-1115" }, { "binary_version": "5.4.0-1115.124~18.04.1", "binary_name": "linux-tools-5.4.0-1115-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-headers-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-image-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-image-5.4.0-1100-raspi-dbgsym" }, { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-modules-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-raspi-5.4-headers-5.4.0-1100" }, { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-raspi-5.4-tools-5.4.0-1100" }, { "binary_version": "5.4.0-1100.112~18.04.1", "binary_name": "linux-tools-5.4.0-1100-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-169.187", "binary_name": "block-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "block-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "crypto-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "crypto-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "dasd-extra-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "dasd-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "fat-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "fat-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "fb-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "firewire-core-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "floppy-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "fs-core-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "fs-core-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "fs-secondary-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "fs-secondary-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "input-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "input-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "ipmi-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "ipmi-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "kernel-image-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "kernel-image-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-buildinfo-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-buildinfo-5.4.0-169-generic-lpae" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-buildinfo-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-cloud-tools-5.4.0-169" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-cloud-tools-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-cloud-tools-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-doc" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-headers-5.4.0-169" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-headers-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-headers-5.4.0-169-generic-lpae" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-headers-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-5.4.0-169-generic-dbgsym" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-5.4.0-169-generic-lpae" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-5.4.0-169-generic-lpae-dbgsym" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-unsigned-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-unsigned-5.4.0-169-generic-dbgsym" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-unsigned-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-image-unsigned-5.4.0-169-lowlatency-dbgsym" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-libc-dev" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-modules-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-modules-5.4.0-169-generic-lpae" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-modules-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-modules-extra-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-source-5.4.0" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-tools-5.4.0-169" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-tools-5.4.0-169-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-tools-5.4.0-169-generic-lpae" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-tools-5.4.0-169-lowlatency" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-tools-common" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-tools-host" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-udebs-generic" }, { "binary_version": "5.4.0-169.187", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "5.4.0-169.187", "binary_name": "md-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "md-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "message-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "mouse-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "mouse-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "multipath-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "multipath-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nfs-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nfs-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nic-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nic-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nic-pcmcia-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nic-shared-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nic-shared-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nic-usb-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "nic-usb-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "parport-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "parport-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "pata-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "pcmcia-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "pcmcia-storage-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "plip-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "plip-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "ppp-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "ppp-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "sata-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "sata-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "scsi-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "scsi-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "serial-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "storage-core-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "storage-core-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "usb-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "usb-modules-5.4.0-169-generic-lpae-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "virtio-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "vlan-modules-5.4.0-169-generic-di" }, { "binary_version": "5.4.0-169.187", "binary_name": "vlan-modules-5.4.0-169-generic-lpae-di" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1116.126", "binary_name": "linux-aws-cloud-tools-5.4.0-1116" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-aws-headers-5.4.0-1116" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-aws-tools-5.4.0-1116" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-buildinfo-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-cloud-tools-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-headers-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-image-unsigned-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-image-unsigned-5.4.0-1116-aws-dbgsym" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-modules-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-modules-extra-5.4.0-1116-aws" }, { "binary_version": "5.4.0-1116.126", "binary_name": "linux-tools-5.4.0-1116-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-aws-5.15-headers-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-aws-5.15-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-headers-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1051-aws-dbgsym" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-modules-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56~20.04.1", "binary_name": "linux-tools-5.15.0-1051-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1121.128", "binary_name": "linux-azure-cloud-tools-5.4.0-1121" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-azure-headers-5.4.0-1121" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-azure-tools-5.4.0-1121" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-buildinfo-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-cloud-tools-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-headers-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-image-unsigned-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-image-unsigned-5.4.0-1121-azure-dbgsym" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-modules-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-modules-extra-5.4.0-1121-azure" }, { "binary_version": "5.4.0-1121.128", "binary_name": "linux-tools-5.4.0-1121-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-azure-5.15-headers-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-azure-5.15-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-headers-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-dbgsym" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-modules-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61~20.04.1", "binary_name": "linux-tools-5.15.0-1053-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1053.61~20.04.1.1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fde" }, { "binary_version": "5.15.0-1053.61~20.04.1.1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fde-dbgsym" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1076.82", "binary_name": "linux-bluefield-headers-5.4.0-1076" }, { "binary_version": "5.4.0-1076.82", "binary_name": "linux-bluefield-tools-5.4.0-1076" }, { "binary_version": "5.4.0-1076.82", "binary_name": "linux-buildinfo-5.4.0-1076-bluefield" }, { "binary_version": "5.4.0-1076.82", "binary_name": "linux-headers-5.4.0-1076-bluefield" }, { "binary_version": "5.4.0-1076.82", "binary_name": "linux-image-unsigned-5.4.0-1076-bluefield" }, { "binary_version": "5.4.0-1076.82", "binary_name": "linux-image-unsigned-5.4.0-1076-bluefield-dbgsym" }, { "binary_version": "5.4.0-1076.82", "binary_name": "linux-modules-5.4.0-1076-bluefield" }, { "binary_version": "5.4.0-1076.82", "binary_name": "linux-tools-5.4.0-1076-bluefield" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1120.129", "binary_name": "linux-buildinfo-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-gcp-headers-5.4.0-1120" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-gcp-tools-5.4.0-1120" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-headers-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-image-unsigned-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-image-unsigned-5.4.0-1120-gcp-dbgsym" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-modules-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-modules-extra-5.4.0-1120-gcp" }, { "binary_version": "5.4.0-1120.129", "binary_name": "linux-tools-5.4.0-1120-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-gcp-5.15-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-gcp-5.15-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-headers-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-dbgsym" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-modules-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56~20.04.1", "binary_name": "linux-tools-5.15.0-1048-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1083.87", "binary_name": "linux-buildinfo-5.4.0-1083-gkeop" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-cloud-tools-5.4.0-1083-gkeop" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-gkeop-cloud-tools-5.4.0-1083" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-gkeop-headers-5.4.0-1083" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-gkeop-source-5.4.0" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-gkeop-tools-5.4.0-1083" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-headers-5.4.0-1083-gkeop" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-image-unsigned-5.4.0-1083-gkeop" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-image-unsigned-5.4.0-1083-gkeop-dbgsym" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-modules-5.4.0-1083-gkeop" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-modules-extra-5.4.0-1083-gkeop" }, { "binary_version": "5.4.0-1083.87", "binary_name": "linux-tools-5.4.0-1083-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1034" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-gkeop-5.15-headers-5.15.0-1034" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-gkeop-5.15-tools-5.15.0-1034" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-headers-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1034-gkeop-dbgsym" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-modules-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40~20.04.1", "binary_name": "linux-tools-5.15.0-1034-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-buildinfo-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-buildinfo-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-buildinfo-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-headers-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-headers-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-headers-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-hwe-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-hwe-5.15-headers-5.15.0-91" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-hwe-5.15-source-5.15.0" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-hwe-5.15-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-hwe-5.15-tools-common" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-hwe-5.15-tools-host" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-5.15.0-91-generic-dbgsym" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-5.15.0-91-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-generic-64k-dbgsym" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-generic-dbgsym" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-extra-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-tools-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-tools-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-tools-5.15.0-91-generic-lpae" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1063.68", "binary_name": "linux-buildinfo-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-headers-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-ibm-headers-5.4.0-1063" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-ibm-source-5.4.0" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-ibm-tools-5.4.0-1063" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-image-unsigned-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-image-unsigned-5.4.0-1063-ibm-dbgsym" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-modules-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-modules-extra-5.4.0-1063-ibm" }, { "binary_version": "5.4.0-1063.68", "binary_name": "linux-tools-5.4.0-1063-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-headers-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-ibm-5.15-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-ibm-5.15-source-5.15.0" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-ibm-5.15-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1044-ibm-dbgsym" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-modules-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47~20.04.1", "binary_name": "linux-tools-5.15.0-1044-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-headers-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1046-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1046" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1046" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1046" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-common" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-host" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-modules-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52~20.04.1", "binary_name": "linux-tools-5.15.0-1046-intel-iotg" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1028.29", "binary_name": "linux-buildinfo-5.4.0-1028-iot" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-headers-5.4.0-1028-iot" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-image-5.4.0-1028-iot" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-image-5.4.0-1028-iot-dbgsym" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-image-unsigned-5.4.0-1028-iot" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-image-unsigned-5.4.0-1028-iot-dbgsym" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-iot-headers-5.4.0-1028" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-iot-tools-5.4.0-1028" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-iot-tools-common" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-modules-5.4.0-1028-iot" }, { "binary_version": "5.4.0-1028.29", "binary_name": "linux-tools-5.4.0-1028-iot" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1104.111", "binary_name": "linux-buildinfo-5.4.0-1104-kvm" }, { "binary_version": "5.4.0-1104.111", "binary_name": "linux-headers-5.4.0-1104-kvm" }, { "binary_version": "5.4.0-1104.111", "binary_name": "linux-image-unsigned-5.4.0-1104-kvm" }, { "binary_version": "5.4.0-1104.111", "binary_name": "linux-image-unsigned-5.4.0-1104-kvm-dbgsym" }, { "binary_version": "5.4.0-1104.111", "binary_name": "linux-kvm-headers-5.4.0-1104" }, { "binary_version": "5.4.0-1104.111", "binary_name": "linux-kvm-tools-5.4.0-1104" }, { "binary_version": "5.4.0-1104.111", "binary_name": "linux-modules-5.4.0-1104-kvm" }, { "binary_version": "5.4.0-1104.111", "binary_name": "linux-tools-5.4.0-1104-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-buildinfo-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-buildinfo-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-headers-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-headers-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency-dbgsym" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-91" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-common" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-host" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-tools-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101~20.04.1", "binary_name": "linux-tools-5.15.0-91-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1115.124", "binary_name": "linux-buildinfo-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-headers-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-image-unsigned-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-image-unsigned-5.4.0-1115-oracle-dbgsym" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-modules-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-modules-extra-5.4.0-1115-oracle" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-oracle-headers-5.4.0-1115" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-oracle-tools-5.4.0-1115" }, { "binary_version": "5.4.0-1115.124", "binary_name": "linux-tools-5.4.0-1115-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-headers-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1049-oracle-dbgsym" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-modules-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-oracle-5.15-headers-5.15.0-1049" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-oracle-5.15-tools-5.15.0-1049" }, { "binary_version": "5.15.0-1049.55~20.04.1", "binary_name": "linux-tools-5.15.0-1049-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1100.112", "binary_name": "linux-buildinfo-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112", "binary_name": "linux-headers-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112", "binary_name": "linux-image-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112", "binary_name": "linux-image-5.4.0-1100-raspi-dbgsym" }, { "binary_version": "5.4.0-1100.112", "binary_name": "linux-modules-5.4.0-1100-raspi" }, { "binary_version": "5.4.0-1100.112", "binary_name": "linux-raspi-headers-5.4.0-1100" }, { "binary_version": "5.4.0-1100.112", "binary_name": "linux-raspi-tools-5.4.0-1100" }, { "binary_version": "5.4.0-1100.112", "binary_name": "linux-tools-5.4.0-1100-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1047-generic" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-headers-5.15.0-1047-generic" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-image-5.15.0-1047-generic" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-image-5.15.0-1047-generic-dbgsym" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-modules-5.15.0-1047-generic" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1047-generic" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-riscv-5.15-headers-5.15.0-1047" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-riscv-5.15-tools-5.15.0-1047" }, { "binary_version": "5.15.0-1047.51~20.04.1", "binary_name": "linux-tools-5.15.0-1047-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.0-1035.39", "binary_name": "linux-buildinfo-5.4.0-1035-xilinx-zynqmp" }, { "binary_version": "5.4.0-1035.39", "binary_name": "linux-headers-5.4.0-1035-xilinx-zynqmp" }, { "binary_version": "5.4.0-1035.39", "binary_name": "linux-image-5.4.0-1035-xilinx-zynqmp" }, { "binary_version": "5.4.0-1035.39", "binary_name": "linux-image-5.4.0-1035-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.4.0-1035.39", "binary_name": "linux-modules-5.4.0-1035-xilinx-zynqmp" }, { "binary_version": "5.4.0-1035.39", "binary_name": "linux-tools-5.4.0-1035-xilinx-zynqmp" }, { "binary_version": "5.4.0-1035.39", "binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1035" }, { "binary_version": "5.4.0-1035.39", "binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1035" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-91.101", "binary_name": "linux-buildinfo-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-buildinfo-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-buildinfo-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-cloud-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-cloud-tools-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-doc" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-headers-5.15.0-91" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-headers-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-headers-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-headers-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-5.15.0-91-generic-dbgsym" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-5.15.0-91-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-generic-64k-dbgsym" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-generic-dbgsym" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-libc-dev" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-extra-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-iwlwifi-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-source-5.15.0" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-5.15.0-91-generic" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-5.15.0-91-generic-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-5.15.0-91-generic-lpae" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-common" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1051.56", "binary_name": "linux-aws-cloud-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-aws-headers-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-aws-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-buildinfo-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-cloud-tools-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-headers-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-image-unsigned-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-image-unsigned-5.15.0-1051-aws-dbgsym" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-modules-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-modules-extra-5.15.0-1051-aws" }, { "binary_version": "5.15.0-1051.56", "binary_name": "linux-tools-5.15.0-1051-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1017" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-aws-6.2-headers-6.2.0-1017" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-aws-6.2-tools-6.2.0-1017" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-buildinfo-6.2.0-1017-aws" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-cloud-tools-6.2.0-1017-aws" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-headers-6.2.0-1017-aws" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1017-aws" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1017-aws-dbgsym" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-modules-6.2.0-1017-aws" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-modules-extra-6.2.0-1017-aws" }, { "binary_version": "6.2.0-1017.17~22.04.1", "binary_name": "linux-tools-6.2.0-1017-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1011" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-aws-6.5-headers-6.5.0-1011" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-aws-6.5-tools-6.5.0-1011" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1011-aws" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-1011-aws" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-headers-6.5.0-1011-aws" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1011-aws" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1011-aws-dbgsym" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-modules-6.5.0-1011-aws" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1011-aws" }, { "binary_version": "6.5.0-1011.11~22.04.1", "binary_name": "linux-tools-6.5.0-1011-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-aws-6.8-headers-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-aws-6.8-tools-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-buildinfo-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-cloud-tools-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-headers-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-1009-aws-dbgsym" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-modules-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-modules-extra-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-modules-iwlwifi-6.8.0-1009-aws" }, { "binary_version": "6.8.0-1009.9~22.04.2", "binary_name": "linux-tools-6.8.0-1009-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1053.61", "binary_name": "linux-azure-cloud-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-azure-headers-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-azure-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-buildinfo-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-cloud-tools-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-headers-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-image-unsigned-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-dbgsym" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-modules-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-modules-extra-5.15.0-1053-azure" }, { "binary_version": "5.15.0-1053.61", "binary_name": "linux-tools-5.15.0-1053-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1018" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-azure-6.2-headers-6.2.0-1018" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-azure-6.2-tools-6.2.0-1018" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-buildinfo-6.2.0-1018-azure" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-cloud-tools-6.2.0-1018-azure" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-headers-6.2.0-1018-azure" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1018-azure" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1018-azure-dbgsym" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-modules-6.2.0-1018-azure" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-modules-extra-6.2.0-1018-azure" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-tools-6.2.0-1018-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-azure-6.5-headers-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-azure-6.5-tools-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1010-azure" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-1010-azure" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-headers-6.5.0-1010-azure" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1010-azure" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1010-azure-dbgsym" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-modules-6.5.0-1010-azure" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1010-azure" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-1010-azure" }, { "binary_version": "6.5.0-1010.10~22.04.1", "binary_name": "linux-tools-6.5.0-1010-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-azure-6.8-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-azure-6.8-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-headers-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-azure-dbgsym" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1008-azure" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-tools-6.8.0-1008-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1053.61.1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fde" }, { "binary_version": "5.15.0-1053.61.1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fde-dbgsym" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1048.56", "binary_name": "linux-buildinfo-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-gcp-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-gcp-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-headers-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-dbgsym" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-modules-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-modules-extra-5.15.0-1048-gcp" }, { "binary_version": "5.15.0-1048.56", "binary_name": "linux-tools-5.15.0-1048-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-buildinfo-6.2.0-1021-gcp" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-gcp-6.2-headers-6.2.0-1021" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-gcp-6.2-tools-6.2.0-1021" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-headers-6.2.0-1021-gcp" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1021-gcp" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1021-gcp-dbgsym" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-modules-6.2.0-1021-gcp" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-modules-extra-6.2.0-1021-gcp" }, { "binary_version": "6.2.0-1021.23~22.04.1", "binary_name": "linux-tools-6.2.0-1021-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-buildinfo-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-gcp-6.5-headers-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-gcp-6.5-tools-6.5.0-1010" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-headers-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-image-unsigned-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-image-unsigned-6.5.0-1010-gcp-dbgsym" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-modules-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-modules-extra-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-modules-iwlwifi-6.5.0-1010-gcp" }, { "binary_version": "6.5.0-1010.10~22.04.3", "binary_name": "linux-tools-6.5.0-1010-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-gcp-6.8-headers-6.8.0-1010" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-gcp-6.8-tools-6.8.0-1010" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-headers-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1010-gcp-dbgsym" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-modules-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1010-gcp" }, { "binary_version": "6.8.0-1010.11~22.04.1", "binary_name": "linux-tools-6.8.0-1010-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1048.53", "binary_name": "linux-buildinfo-5.15.0-1048-gke" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-gke-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-gke-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-headers-5.15.0-1048-gke" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-image-unsigned-5.15.0-1048-gke" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-image-unsigned-5.15.0-1048-gke-dbgsym" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-modules-5.15.0-1048-gke" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-modules-extra-5.15.0-1048-gke" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-modules-iwlwifi-5.15.0-1048-gke" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-tools-5.15.0-1048-gke" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1034.40", "binary_name": "linux-buildinfo-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-cloud-tools-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-gkeop-cloud-tools-5.15.0-1034" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-gkeop-headers-5.15.0-1034" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-gkeop-tools-5.15.0-1034" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-headers-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-image-unsigned-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-image-unsigned-5.15.0-1034-gkeop-dbgsym" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-modules-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-modules-extra-5.15.0-1034-gkeop" }, { "binary_version": "5.15.0-1034.40", "binary_name": "linux-tools-5.15.0-1034-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-buildinfo-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-buildinfo-6.2.0-39-generic-64k" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-buildinfo-6.2.0-39-generic-lpae" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-cloud-tools-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-headers-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-headers-6.2.0-39-generic-64k" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-headers-6.2.0-39-generic-lpae" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-39" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-hwe-6.2-cloud-tools-common" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-hwe-6.2-headers-6.2.0-39" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-hwe-6.2-tools-6.2.0-39" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-hwe-6.2-tools-common" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-hwe-6.2-tools-host" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-6.2.0-39-generic-dbgsym" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-6.2.0-39-generic-lpae" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-6.2.0-39-generic-lpae-dbgsym" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-39-generic-64k" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-39-generic-64k-dbgsym" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-39-generic-dbgsym" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-modules-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-modules-6.2.0-39-generic-64k" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-modules-6.2.0-39-generic-lpae" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-modules-extra-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-modules-ipu6-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-modules-ivsc-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-modules-iwlwifi-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-source-6.2.0" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-tools-6.2.0-39-generic" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-tools-6.2.0-39-generic-64k" }, { "binary_version": "6.2.0-39.40~22.04.1", "binary_name": "linux-tools-6.2.0-39-generic-lpae" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-headers-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-headers-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-cloud-tools-common" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-headers-6.5.0-14" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-tools-common" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-hwe-6.5-tools-host" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-6.5.0-14-generic-dbgsym" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic-64k-dbgsym" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-generic-dbgsym" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-6.5.0-14-generic-64k" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-extra-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-ipu6-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-ivsc-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-source-6.5.0" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-tools-6.5.0-14-generic" }, { "binary_version": "6.5.0-14.14~22.04.1", "binary_name": "linux-tools-6.5.0-14-generic-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-buildinfo-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-buildinfo-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-cloud-tools-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-headers-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-headers-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-hwe-6.8-headers-6.8.0-38" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-hwe-6.8-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-6.8.0-38-generic-dbgsym" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic-64k-dbgsym" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-38-generic-dbgsym" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-6.8.0-38-generic-64k" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-extra-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-ipu6-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-iwlwifi-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-modules-usbio-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-tools-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38~22.04.1", "binary_name": "linux-tools-6.8.0-38-generic-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1044.47", "binary_name": "linux-buildinfo-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-headers-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-ibm-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-ibm-source-5.15.0" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-ibm-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-image-unsigned-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-image-unsigned-5.15.0-1044-ibm-dbgsym" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-modules-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-modules-extra-5.15.0-1044-ibm" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-tools-5.15.0-1044-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1046.52", "binary_name": "linux-buildinfo-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-cloud-tools-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-headers-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-image-unsigned-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-image-unsigned-5.15.0-1046-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1046" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-intel-iotg-cloud-tools-common" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-intel-iotg-headers-5.15.0-1046" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-intel-iotg-tools-5.15.0-1046" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-intel-iotg-tools-common" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-intel-iotg-tools-host" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-modules-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-modules-extra-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-modules-iwlwifi-5.15.0-1046-intel-iotg" }, { "binary_version": "5.15.0-1046.52", "binary_name": "linux-tools-5.15.0-1046-intel-iotg" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1048.53", "binary_name": "linux-buildinfo-5.15.0-1048-kvm" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-headers-5.15.0-1048-kvm" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-image-unsigned-5.15.0-1048-kvm" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-image-unsigned-5.15.0-1048-kvm-dbgsym" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-kvm-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-kvm-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-modules-5.15.0-1048-kvm" }, { "binary_version": "5.15.0-1048.53", "binary_name": "linux-tools-5.15.0-1048-kvm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-91.101", "binary_name": "linux-buildinfo-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-buildinfo-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-cloud-tools-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-headers-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-headers-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-image-unsigned-5.15.0-91-lowlatency-dbgsym" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-lowlatency-cloud-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-lowlatency-cloud-tools-common" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-lowlatency-headers-5.15.0-91" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-lowlatency-tools-5.15.0-91" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-lowlatency-tools-common" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-lowlatency-tools-host" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-5.15.0-91-lowlatency-64k" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-modules-iwlwifi-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-5.15.0-91-lowlatency" }, { "binary_version": "5.15.0-91.101", "binary_name": "linux-tools-5.15.0-91-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-buildinfo-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-buildinfo-6.2.0-1018-lowlatency-64k" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-cloud-tools-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-headers-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-headers-6.2.0-1018-lowlatency-64k" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k-dbgsym" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-dbgsym" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1018" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1018" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1018" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-lowlatency-hwe-6.2-tools-common" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-lowlatency-hwe-6.2-tools-host" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-modules-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-modules-6.2.0-1018-lowlatency-64k" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-modules-ipu6-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-modules-ivsc-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-modules-iwlwifi-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-tools-6.2.0-1018-lowlatency" }, { "binary_version": "6.2.0-1018.18~22.04.1", "binary_name": "linux-tools-6.2.0-1018-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-headers-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-headers-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency-64k-dbgsym" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-14-lowlatency-dbgsym" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-14" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-14" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-common" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-host" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-modules-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-modules-6.5.0-14-lowlatency-64k" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-tools-6.5.0-14-lowlatency" }, { "binary_version": "6.5.0-14.14.1~22.04.1", "binary_name": "linux-tools-6.5.0-14-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-buildinfo-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-buildinfo-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-cloud-tools-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-headers-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-headers-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-image-unsigned-6.8.0-38-lowlatency-dbgsym" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-modules-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-modules-6.8.0-38-lowlatency-64k" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-modules-iwlwifi-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-tools-6.8.0-38-lowlatency" }, { "binary_version": "6.8.0-38.38.1~22.04.2", "binary_name": "linux-tools-6.8.0-38-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1042.42", "binary_name": "linux-buildinfo-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-buildinfo-5.15.0-1042-nvidia-lowlatency" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-cloud-tools-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-cloud-tools-5.15.0-1042-nvidia-lowlatency" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-headers-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-headers-5.15.0-1042-nvidia-lowlatency" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-image-unsigned-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-image-unsigned-5.15.0-1042-nvidia-dbgsym" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-image-unsigned-5.15.0-1042-nvidia-lowlatency" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-image-unsigned-5.15.0-1042-nvidia-lowlatency-dbgsym" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-modules-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-modules-5.15.0-1042-nvidia-lowlatency" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-modules-extra-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-modules-nvidia-fs-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-modules-nvidia-fs-5.15.0-1042-nvidia-lowlatency" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-nvidia-cloud-tools-5.15.0-1042" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-nvidia-cloud-tools-common" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-nvidia-headers-5.15.0-1042" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-nvidia-tools-5.15.0-1042" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-nvidia-tools-common" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-nvidia-tools-host" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-tools-5.15.0-1042-nvidia" }, { "binary_version": "5.15.0-1042.42", "binary_name": "linux-tools-5.15.0-1042-nvidia-lowlatency" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.0-1013.13", "binary_name": "linux-buildinfo-6.2.0-1013-nvidia" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-buildinfo-6.2.0-1013-nvidia-64k" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-headers-6.2.0-1013-nvidia" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-headers-6.2.0-1013-nvidia-64k" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-image-unsigned-6.2.0-1013-nvidia" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-image-unsigned-6.2.0-1013-nvidia-64k" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-image-unsigned-6.2.0-1013-nvidia-64k-dbgsym" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-image-unsigned-6.2.0-1013-nvidia-dbgsym" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-modules-6.2.0-1013-nvidia" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-modules-6.2.0-1013-nvidia-64k" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-modules-extra-6.2.0-1013-nvidia" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-modules-nvidia-fs-6.2.0-1013-nvidia" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-modules-nvidia-fs-6.2.0-1013-nvidia-64k" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-nvidia-6.2-headers-6.2.0-1013" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-nvidia-6.2-tools-6.2.0-1013" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-nvidia-6.2-tools-host" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-tools-6.2.0-1013-nvidia" }, { "binary_version": "6.2.0-1013.13", "binary_name": "linux-tools-6.2.0-1013-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-1007.7", "binary_name": "linux-buildinfo-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-buildinfo-6.5.0-1007-nvidia-64k" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-headers-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-headers-6.5.0-1007-nvidia-64k" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-nvidia-64k" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-nvidia-64k-dbgsym" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-image-unsigned-6.5.0-1007-nvidia-dbgsym" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-6.5.0-1007-nvidia-64k" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-extra-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-ipu6-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-ivsc-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-modules-iwlwifi-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-nvidia-6.5-headers-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-nvidia-6.5-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-nvidia-6.5-tools-host" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-tools-6.5.0-1007-nvidia" }, { "binary_version": "6.5.0-1007.7", "binary_name": "linux-tools-6.5.0-1007-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-buildinfo-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-headers-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-headers-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-image-unsigned-6.8.0-1008-nvidia-dbgsym" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-extra-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-nvidia-6.8-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-nvidia-6.8-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-nvidia-6.8-tools-host" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-tools-6.8.0-1008-nvidia" }, { "binary_version": "6.8.0-1008.8~22.04.1", "binary_name": "linux-tools-6.8.0-1008-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.1.0-1026.26", "binary_name": "linux-buildinfo-6.1.0-1026-oem" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-headers-6.1.0-1026-oem" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-image-unsigned-6.1.0-1026-oem" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-image-unsigned-6.1.0-1026-oem-dbgsym" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-modules-6.1.0-1026-oem" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-modules-ipu6-6.1.0-1026-oem" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-modules-ivsc-6.1.0-1026-oem" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-modules-iwlwifi-6.1.0-1026-oem" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-oem-6.1-headers-6.1.0-1026" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-oem-6.1-tools-6.1.0-1026" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-oem-6.1-tools-host" }, { "binary_version": "6.1.0-1026.26", "binary_name": "linux-tools-6.1.0-1026-oem" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-1009.10", "binary_name": "linux-buildinfo-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-headers-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-image-unsigned-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-image-unsigned-6.5.0-1009-oem-dbgsym" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-modules-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-modules-ipu6-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-modules-ivsc-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-modules-iwlwifi-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-oem-6.5-headers-6.5.0-1009" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-oem-6.5-lib-rust-6.5.0-1009-oem" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-oem-6.5-tools-6.5.0-1009" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-oem-6.5-tools-host" }, { "binary_version": "6.5.0-1009.10", "binary_name": "linux-tools-6.5.0-1009-oem" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1049.55", "binary_name": "linux-buildinfo-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-headers-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-image-unsigned-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-image-unsigned-5.15.0-1049-oracle-dbgsym" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-modules-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-modules-extra-5.15.0-1049-oracle" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-oracle-headers-5.15.0-1049" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-oracle-tools-5.15.0-1049" }, { "binary_version": "5.15.0-1049.55", "binary_name": "linux-tools-5.15.0-1049-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-buildinfo-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-headers-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-image-unsigned-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-image-unsigned-6.5.0-1013-oracle-dbgsym" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-modules-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-modules-extra-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-modules-iwlwifi-6.5.0-1013-oracle" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-oracle-6.5-headers-6.5.0-1013" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-oracle-6.5-tools-6.5.0-1013" }, { "binary_version": "6.5.0-1013.13~22.04.4", "binary_name": "linux-tools-6.5.0-1013-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-buildinfo-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-buildinfo-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-headers-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-headers-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-image-unsigned-6.8.0-1006-oracle-dbgsym" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-extra-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-extra-6.8.0-1006-oracle-64k" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-modules-iwlwifi-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-oracle-6.8-headers-6.8.0-1006" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-oracle-6.8-tools-6.8.0-1006" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-tools-6.8.0-1006-oracle" }, { "binary_version": "6.8.0-1006.6~22.04.3", "binary_name": "linux-tools-6.8.0-1006-oracle-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1044.47", "binary_name": "linux-buildinfo-5.15.0-1044-raspi" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-headers-5.15.0-1044-raspi" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-image-5.15.0-1044-raspi" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-image-5.15.0-1044-raspi-dbgsym" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-modules-5.15.0-1044-raspi" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-modules-extra-5.15.0-1044-raspi" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-raspi-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-raspi-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.47", "binary_name": "linux-tools-5.15.0-1044-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-headers-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-image-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-image-6.5.0-17-generic-dbgsym" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-modules-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-modules-extra-6.5.0-17-generic" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-riscv-6.5-headers-6.5.0-17" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-riscv-6.5-tools-6.5.0-17" }, { "binary_version": "6.5.0-17.17.1.1~22.04.1", "binary_name": "linux-tools-6.5.0-17-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-buildinfo-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-headers-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-image-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-image-6.8.0-38-generic-dbgsym" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-modules-6.8.0-38-generic" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-riscv-6.8-headers-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-riscv-6.8-tools-6.8.0-38" }, { "binary_version": "6.8.0-38.38.1~22.04.1", "binary_name": "linux-tools-6.8.0-38-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-headers-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-image-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-image-6.5.0-1007-starfive-dbgsym" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-modules-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1007-starfive" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-starfive-6.5-headers-6.5.0-1007" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-starfive-6.5-tools-6.5.0-1007" }, { "binary_version": "6.5.0-1007.8~22.04.1", "binary_name": "linux-tools-6.5.0-1007-starfive" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1027.31", "binary_name": "linux-buildinfo-5.15.0-1027-xilinx-zynqmp" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-headers-5.15.0-1027-xilinx-zynqmp" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-image-5.15.0-1027-xilinx-zynqmp" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-image-5.15.0-1027-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-modules-5.15.0-1027-xilinx-zynqmp" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-tools-5.15.0-1027-xilinx-zynqmp" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1027" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1027" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-xilinx-zynqmp-tools-common" }, { "binary_version": "5.15.0-1027.31", "binary_name": "linux-xilinx-zynqmp-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-aws-fips-headers-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-aws-fips-tools-5.15.0-1051" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-buildinfo-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-cloud-tools-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-headers-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips-dbgsym" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-modules-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-modules-extra-5.15.0-1051-aws-fips" }, { "binary_version": "5.15.0-1051.56+fips1", "binary_name": "linux-tools-5.15.0-1051-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-azure-fips-headers-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-azure-fips-tools-5.15.0-1053" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-buildinfo-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-cloud-tools-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-headers-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips-dbgsym" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-modules-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-modules-extra-5.15.0-1053-azure-fips" }, { "binary_version": "5.15.0-1053.61+fips1", "binary_name": "linux-tools-5.15.0-1053-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-headers-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips-dbgsym" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-tools-5.15.0-1048-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1052" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-aws-fips-headers-5.15.0-1052" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-aws-fips-tools-5.15.0-1052" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-buildinfo-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-cloud-tools-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-headers-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-image-unsigned-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-image-unsigned-5.15.0-1052-aws-fips-dbgsym" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-modules-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-modules-extra-5.15.0-1052-aws-fips" }, { "binary_version": "5.15.0-1052.57+fips1", "binary_name": "linux-tools-5.15.0-1052-aws-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1058" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-azure-fips-headers-5.15.0-1058" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-azure-fips-tools-5.15.0-1058" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-buildinfo-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-cloud-tools-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-headers-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips-dbgsym" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-modules-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-modules-extra-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-modules-iwlwifi-5.15.0-1058-azure-fips" }, { "binary_version": "5.15.0-1058.66+fips1", "binary_name": "linux-tools-5.15.0-1058-azure-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-buildinfo-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-fips-headers-5.15.0-92" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-fips-tools-5.15.0-92" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-fips-tools-host" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-headers-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-image-unsigned-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-image-unsigned-5.15.0-92-fips-dbgsym" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-modules-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-modules-extra-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-modules-iwlwifi-5.15.0-92-fips" }, { "binary_version": "5.15.0-92.102+fips1", "binary_name": "linux-tools-5.15.0-92-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-gcp-fips-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-headers-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips-dbgsym" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips" }, { "binary_version": "5.15.0-1048.56+fips1", "binary_name": "linux-tools-5.15.0-1048-gcp-fips" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "ubuntu_priority": "medium", "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-31.31", "binary_name": "linux-buildinfo-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-buildinfo-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-cloud-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-cloud-tools-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-doc" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-headers-6.8.0-31" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-headers-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-headers-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-6.8.0-31-generic-dbgsym" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic-64k-dbgsym" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-image-unsigned-6.8.0-31-generic-dbgsym" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-lib-rust-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-libc-dev" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-extra-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-ipu6-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-ivsc-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-modules-iwlwifi-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-source-6.8.0" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-6.8.0-31-generic-64k" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-common" }, { "binary_version": "6.8.0-31.31", "binary_name": "linux-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1008.8", "binary_name": "linux-aws-cloud-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-aws-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-aws-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-buildinfo-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-cloud-tools-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-headers-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-image-unsigned-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-image-unsigned-6.8.0-1008-aws-dbgsym" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-modules-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-modules-extra-6.8.0-1008-aws" }, { "binary_version": "6.8.0-1008.8", "binary_name": "linux-tools-6.8.0-1008-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1007.7", "binary_name": "linux-azure-cloud-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-azure-headers-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-azure-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-cloud-tools-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-azure-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-extra-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-iwlwifi-6.8.0-1007-azure" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-gcp-headers-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-gcp-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-gcp-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-extra-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-iwlwifi-6.8.0-1007-gcp" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-buildinfo-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-buildinfo-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-cloud-tools-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-headers-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-headers-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-unsigned-6.8.0-31-lowlatency-dbgsym" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-cloud-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-cloud-tools-common" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-headers-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-lib-rust-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-tools-common" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-lowlatency-tools-host" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-6.8.0-31-lowlatency-64k" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-iwlwifi-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-tools-6.8.0-31-lowlatency" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-tools-6.8.0-31-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1005.5", "binary_name": "linux-buildinfo-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-buildinfo-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-headers-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-headers-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-64k-dbgsym" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-image-unsigned-6.8.0-1005-oracle-dbgsym" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-extra-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-extra-6.8.0-1005-oracle-64k" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-modules-iwlwifi-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-oracle-headers-6.8.0-1005" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-oracle-tools-6.8.0-1005" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-tools-6.8.0-1005-oracle" }, { "binary_version": "6.8.0-1005.5", "binary_name": "linux-tools-6.8.0-1005-oracle-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1004.4", "binary_name": "linux-buildinfo-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-headers-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-image-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-image-6.8.0-1004-raspi-dbgsym" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-modules-6.8.0-1004-raspi" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-raspi-headers-6.8.0-1004" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-raspi-tools-6.8.0-1004" }, { "binary_version": "6.8.0-1004.4", "binary_name": "linux-tools-6.8.0-1004-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.11.0-1001.1", "binary_name": "linux-buildinfo-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-cloud-tools-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-headers-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-image-unsigned-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-image-unsigned-6.11.0-1001-realtime-dbgsym" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-modules-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-modules-extra-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-modules-iwlwifi-6.11.0-1001-realtime" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-realtime-cloud-tools-6.11.0-1001" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-realtime-headers-6.11.0-1001" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-realtime-tools-6.11.0-1001" }, { "binary_version": "6.11.0-1001.1", "binary_name": "linux-tools-6.11.0-1001-realtime" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-buildinfo-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-headers-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-image-6.8.0-31-generic-dbgsym" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-modules-6.8.0-31-generic" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-riscv-headers-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-riscv-tools-6.8.0-31" }, { "binary_version": "6.8.0-31.31.1", "binary_name": "linux-tools-6.8.0-31-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.6.0-14.14", "binary_name": "linux-buildinfo-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-buildinfo-6.6.0-14-generic-64k" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-cloud-tools-6.6.0-14" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-cloud-tools-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-doc" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-headers-6.6.0-14" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-headers-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-headers-6.6.0-14-generic-64k" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-image-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-image-6.6.0-14-generic-dbgsym" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-image-unsigned-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-image-unsigned-6.6.0-14-generic-64k" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-image-unsigned-6.6.0-14-generic-64k-dbgsym" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-image-unsigned-6.6.0-14-generic-dbgsym" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-libc-dev" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-modules-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-modules-6.6.0-14-generic-64k" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-modules-extra-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-modules-ipu6-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-modules-ivsc-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-modules-iwlwifi-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-source-6.6.0" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-tools-6.6.0-14" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-tools-6.6.0-14-generic" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-tools-6.6.0-14-generic-64k" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-tools-common" }, { "binary_version": "6.6.0-14.14", "binary_name": "linux-tools-host" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.6.0-1001.1", "binary_name": "linux-aws-cloud-tools-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-aws-headers-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-aws-tools-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-buildinfo-6.6.0-1001-aws" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-cloud-tools-6.6.0-1001-aws" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-headers-6.6.0-1001-aws" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-aws" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-aws-dbgsym" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-6.6.0-1001-aws" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-extra-6.6.0-1001-aws" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-tools-6.6.0-1001-aws" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.6.0-1001.1", "binary_name": "linux-azure-cloud-tools-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-azure-headers-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-azure-tools-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-buildinfo-6.6.0-1001-azure" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-cloud-tools-6.6.0-1001-azure" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-headers-6.6.0-1001-azure" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-azure" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-azure-dbgsym" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-6.6.0-1001-azure" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-extra-6.6.0-1001-azure" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-iwlwifi-6.6.0-1001-azure" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-tools-6.6.0-1001-azure" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.6.0-1001.1", "binary_name": "linux-buildinfo-6.6.0-1001-gcp" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-gcp-headers-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-gcp-tools-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-headers-6.6.0-1001-gcp" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-gcp" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-gcp-dbgsym" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-6.6.0-1001-gcp" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-extra-6.6.0-1001-gcp" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-iwlwifi-6.6.0-1001-gcp" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-tools-6.6.0-1001-gcp" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1003.5", "binary_name": "linux-buildinfo-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-gke-headers-6.8.0-1003" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-gke-tools-6.8.0-1003" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-headers-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-image-unsigned-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-image-unsigned-6.8.0-1003-gke-dbgsym" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-modules-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-modules-extra-6.8.0-1003-gke" }, { "binary_version": "6.8.0-1003.5", "binary_name": "linux-tools-6.8.0-1003-gke" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1001.3", "binary_name": "linux-buildinfo-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-cloud-tools-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-gkeop-cloud-tools-6.8.0-1001" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-gkeop-headers-6.8.0-1001" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-gkeop-tools-6.8.0-1001" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-headers-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop-dbgsym" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-modules-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-modules-extra-6.8.0-1001-gkeop" }, { "binary_version": "6.8.0-1001.3", "binary_name": "linux-tools-6.8.0-1001-gkeop" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1001.1", "binary_name": "linux-buildinfo-6.8.0-1001-ibm" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-headers-6.8.0-1001-ibm" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-ibm-headers-6.8.0-1001" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-ibm-source-6.8.0" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-ibm-tools-6.8.0-1001" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-image-unsigned-6.8.0-1001-ibm" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-image-unsigned-6.8.0-1001-ibm-dbgsym" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-modules-6.8.0-1001-ibm" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-modules-extra-6.8.0-1001-ibm" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-modules-iwlwifi-6.8.0-1001-ibm" }, { "binary_version": "6.8.0-1001.1", "binary_name": "linux-tools-6.8.0-1001-ibm" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-buildinfo-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-buildinfo-6.6.0-14-lowlatency-64k" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-cloud-tools-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-headers-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-headers-6.6.0-14-lowlatency-64k" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-image-unsigned-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-image-unsigned-6.6.0-14-lowlatency-64k" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-image-unsigned-6.6.0-14-lowlatency-64k-dbgsym" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-image-unsigned-6.6.0-14-lowlatency-dbgsym" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-lowlatency-cloud-tools-6.6.0-14" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-lowlatency-cloud-tools-common" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-lowlatency-headers-6.6.0-14" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-lowlatency-lib-rust-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-lowlatency-tools-6.6.0-14" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-lowlatency-tools-common" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-lowlatency-tools-host" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-modules-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-modules-6.6.0-14-lowlatency-64k" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-modules-iwlwifi-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-tools-6.6.0-14-lowlatency" }, { "binary_version": "6.6.0-14.14.1", "binary_name": "linux-tools-6.6.0-14-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-buildinfo-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-headers-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-64k-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-image-unsigned-6.8.0-1007-nvidia-dbgsym" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-extra-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-nvidia-fs-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-modules-nvidia-fs-6.8.0-1007-nvidia-64k" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-nvidia-headers-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-nvidia-tools-6.8.0-1007" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-nvidia-tools-host" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-nvidia" }, { "binary_version": "6.8.0-1007.7", "binary_name": "linux-tools-6.8.0-1007-nvidia-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-buildinfo-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-buildinfo-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-headers-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-headers-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k-dbgsym" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-dbgsym" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-extra-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency-64k" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1009" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-nvidia-lowlatency-tools-host" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-tools-6.8.0-1009-nvidia-lowlatency" }, { "binary_version": "6.8.0-1009.9.1", "binary_name": "linux-tools-6.8.0-1009-nvidia-lowlatency-64k" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1003.3", "binary_name": "linux-buildinfo-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-headers-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-image-unsigned-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-image-unsigned-6.8.0-1003-oem-dbgsym" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-ipu6-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-ivsc-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-modules-iwlwifi-6.8.0-1003-oem" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-oem-6.8-headers-6.8.0-1003" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-oem-6.8-tools-6.8.0-1003" }, { "binary_version": "6.8.0-1003.3", "binary_name": "linux-tools-6.8.0-1003-oem" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.6.0-1001.1", "binary_name": "linux-buildinfo-6.6.0-1001-oracle" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-headers-6.6.0-1001-oracle" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-oracle" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-image-unsigned-6.6.0-1001-oracle-dbgsym" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-6.6.0-1001-oracle" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-extra-6.6.0-1001-oracle" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-modules-iwlwifi-6.6.0-1001-oracle" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-oracle-headers-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-oracle-tools-6.6.0-1001" }, { "binary_version": "6.6.0-1001.1", "binary_name": "linux-tools-6.6.0-1001-oracle" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.7.0-1001.1", "binary_name": "linux-buildinfo-6.7.0-1001-raspi" }, { "binary_version": "6.7.0-1001.1", "binary_name": "linux-headers-6.7.0-1001-raspi" }, { "binary_version": "6.7.0-1001.1", "binary_name": "linux-image-6.7.0-1001-raspi" }, { "binary_version": "6.7.0-1001.1", "binary_name": "linux-image-6.7.0-1001-raspi-dbgsym" }, { "binary_version": "6.7.0-1001.1", "binary_name": "linux-modules-6.7.0-1001-raspi" }, { "binary_version": "6.7.0-1001.1", "binary_name": "linux-raspi-headers-6.7.0-1001" }, { "binary_version": "6.7.0-1001.1", "binary_name": "linux-raspi-tools-6.7.0-1001" }, { "binary_version": "6.7.0-1001.1", "binary_name": "linux-tools-6.7.0-1001-raspi" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-buildinfo-6.8.0-20-generic" }, { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-headers-6.8.0-20-generic" }, { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-image-6.8.0-20-generic" }, { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-image-6.8.0-20-generic-dbgsym" }, { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-modules-6.8.0-20-generic" }, { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-riscv-headers-6.8.0-20" }, { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-riscv-tools-6.8.0-20" }, { "binary_version": "6.8.0-20.20.1", "binary_name": "linux-tools-6.8.0-20-generic" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.7.0-2001.1", "binary_name": "linux-buildinfo-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-headers-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-image-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-image-6.7.0-2001-raspi-realtime-dbgsym" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-modules-6.7.0-2001-raspi-realtime" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-raspi-realtime-headers-6.7.0-2001" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-raspi-realtime-tools-6.7.0-2001" }, { "binary_version": "6.7.0-2001.1", "binary_name": "linux-tools-6.7.0-2001-raspi-realtime" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.8.0-1008.19", "binary_name": "linux-buildinfo-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-cloud-tools-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-headers-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-image-unsigned-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-image-unsigned-6.8.0-1008-realtime-dbgsym" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-modules-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-modules-extra-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-modules-iwlwifi-6.8.0-1008-realtime" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-realtime-cloud-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-realtime-headers-6.8.0-1008" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-realtime-tools-6.8.0-1008" }, { "binary_version": "6.8.0-1008.19", "binary_name": "linux-tools-6.8.0-1008-realtime" } ], "priority_reason": "Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 2 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation." }