UBUNTU-CVE-2024-40906

Source
https://ubuntu.com/security/CVE-2024-40906
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-40906.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-40906
Related
Published
2024-07-12T13:15:00Z
Modified
2024-11-12T16:56:25Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Always stop health timer during driver removal Currently, if teardownhca fails to execute during driver removal, mlx5 does not stop the health timer. Afterwards, mlx5 continue with driver teardown. This may lead to a UAF bug, which results in page fault Oops[1], since the health timer invokes after resources were freed. Hence, stop the health monitor even if teardownhca fails. [1] mlx5core 0000:18:00.0: E-Switch: Unload vfs: mode(LEGACY), nvfs(0), necvfs(0), active vports(0) mlx5core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0) mlx5core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0) mlx5core 0000:18:00.0: E-Switch: cleanup mlx5core 0000:18:00.0: waitfunc:1155:(pid 1967079): TEARDOWNHCA(0x103) timeout. Will cause a leak of a command resource mlx5core 0000:18:00.0: mlx5functionclose:1288:(pid 1967079): teardownhca failed, skip cleanup BUG: unable to handle page fault for address: ffffa26487064230 PGD 100c00067 P4D 100c00067 PUD 100e5a067 PMD 105ed7067 PTE 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 0 PID: 0 Comm: swapper/0 Tainted: G OE ------- --- 6.7.0-68.fc38.x8664 #1 Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0013.121520200651 12/15/2020 RIP: 0010:ioread32be+0x34/0x60 RSP: 0018:ffffa26480003e58 EFLAGS: 00010292 RAX: ffffa26487064200 RBX: ffff9042d08161a0 RCX: ffff904c108222c0 RDX: 000000010bbf1b80 RSI: ffffffffc055ddb0 RDI: ffffa26487064230 RBP: ffff9042d08161a0 R08: 0000000000000022 R09: ffff904c108222e8 R10: 0000000000000004 R11: 0000000000000441 R12: ffffffffc055ddb0 R13: ffffa26487064200 R14: ffffa26480003f00 R15: ffff904c108222c0 FS: 0000000000000000(0000) GS:ffff904c10800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffa26487064230 CR3: 00000002c4420006 CR4: 00000000007706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <IRQ> ? _die+0x23/0x70 ? pagefaultoops+0x171/0x4e0 ? excpagefault+0x175/0x180 ? asmexcpagefault+0x26/0x30 ? _pfxpollhealth+0x10/0x10 [mlx5core] ? _pfxpollhealth+0x10/0x10 [mlx5core] ? ioread32be+0x34/0x60 mlx5healthcheckfatalsensors+0x20/0x100 [mlx5core] ? _pfxpollhealth+0x10/0x10 [mlx5core] pollhealth+0x42/0x230 [mlx5core] ? _nexttimerinterrupt+0xbc/0x110 ? _pfxpollhealth+0x10/0x10 [mlx5core] calltimerfn+0x21/0x130 ? _pfxpollhealth+0x10/0x10 [mlx5core] _runtimers+0x222/0x2c0 runtimersoftirq+0x1d/0x40 _dosoftirq+0xc9/0x2c8 _irqexitrcu+0xa6/0xc0 sysvecapictimerinterrupt+0x72/0x90 </IRQ> <TASK> asmsysvecapictimerinterrupt+0x1a/0x20 RIP: 0010:cpuidleenterstate+0xcc/0x440 ? cpuidleenterstate+0xbd/0x440 cpuidleenter+0x2d/0x40 doidle+0x20d/0x270 cpustartupentry+0x2a/0x30 restinit+0xd0/0xd0 archcallrestinit+0xe/0x30 startkernel+0x709/0xa90 x8664startreservations+0x18/0x30 x8664startkernel+0x96/0xa0 secondarystartup64noverify+0x18f/0x19b ---[ end trace 0000000000000000 ]---

References

Affected packages

Ubuntu:14.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.11.0-12.19

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "block-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "block-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "crypto-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "crypto-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "fat-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "fat-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "fb-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "firewire-core-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "floppy-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "fs-core-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "fs-core-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "fs-secondary-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "fs-secondary-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "input-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "input-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "ipmi-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "ipmi-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "irda-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "irda-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "kernel-image-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "kernel-image-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-headers-3.11.0-12"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-headers-3.11.0-12-generic"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-headers-3.11.0-12-generic-lpae"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-image-3.11.0-12-generic"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-image-3.11.0-12-generic-lpae"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-image-extra-3.11.0-12-generic"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-source-3.11.0"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-tools-3.11.0-12"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-tools-3.11.0-12-generic"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-tools-3.11.0-12-generic-lpae"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-udebs-generic"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "linux-udebs-generic-lpae"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "md-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "md-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "message-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "mouse-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "mouse-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "multipath-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "multipath-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nfs-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nfs-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nic-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nic-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nic-pcmcia-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nic-shared-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nic-shared-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nic-usb-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "nic-usb-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "parport-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "parport-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "pata-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "pcmcia-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "pcmcia-storage-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "plip-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "plip-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "ppp-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "ppp-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "sata-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "sata-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "scsi-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "scsi-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "serial-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "speakup-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "speakup-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "squashfs-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "squashfs-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "storage-core-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "storage-core-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "usb-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "usb-modules-3.11.0-12-generic-lpae-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "virtio-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "vlan-modules-3.11.0-12-generic-di"
        },
        {
            "binary_version": "3.11.0-12.19",
            "binary_name": "vlan-modules-3.11.0-12-generic-lpae-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:14.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1002.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-aws-cloud-tools-4.4.0-1002"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-aws-cloud-tools-4.4.0-1002-dbgsym"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-aws-headers-4.4.0-1002"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-aws-tools-4.4.0-1002"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-aws-tools-4.4.0-1002-dbgsym"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-cloud-tools-4.4.0-1002-aws"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-headers-4.4.0-1002-aws"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-image-4.4.0-1002-aws"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-image-4.4.0-1002-aws-dbgsym"
        },
        {
            "binary_version": "4.4.0-1002.2",
            "binary_name": "linux-tools-4.4.0-1002-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:14.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1023.24~14.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-azure-cloud-tools-4.15.0-1023"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-azure-cloud-tools-4.15.0-1023-dbgsym"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-azure-headers-4.15.0-1023"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-azure-tools-4.15.0-1023"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-azure-tools-4.15.0-1023-dbgsym"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-cloud-tools-4.15.0-1023-azure"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-headers-4.15.0-1023-azure"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-1023-azure"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-1023-azure-dbgsym"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-modules-4.15.0-1023-azure"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-modules-extra-4.15.0-1023-azure"
        },
        {
            "binary_version": "4.15.0-1023.24~14.04.1",
            "binary_name": "linux-tools-4.15.0-1023-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:14.04:LTS / linux-lts-xenial

Package

Name
linux-lts-xenial
Purl
pkg:deb/ubuntu/linux-lts-xenial?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-13.29~14.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "block-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "block-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "block-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "block-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "block-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "crypto-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "crypto-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "crypto-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "crypto-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "crypto-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fat-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fat-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fat-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fat-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fat-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fb-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "firewire-core-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "firewire-core-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "firewire-core-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "firewire-core-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "floppy-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "floppy-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "floppy-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "floppy-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-core-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-core-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-core-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-core-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-core-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-secondary-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-secondary-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-secondary-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-secondary-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "fs-secondary-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "input-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "input-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "input-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "input-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "input-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ipmi-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ipmi-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ipmi-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ipmi-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ipmi-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "irda-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "irda-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "irda-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "irda-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "irda-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "kernel-image-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "kernel-image-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "kernel-image-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "kernel-image-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "kernel-image-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-cloud-tools-4.4.0-13-generic"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-cloud-tools-4.4.0-13-lowlatency"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13-generic"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13-generic-lpae"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13-lowlatency"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-headers-4.4.0-13-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-generic"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-generic-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-generic-lpae"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-generic-lpae-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-lowlatency"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-lowlatency-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc-e500mc-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc-smp-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc64-emb-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-4.4.0-13-powerpc64-smp-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-image-extra-4.4.0-13-generic"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-13"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-13-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-tools-4.4.0-13"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-tools-4.4.0-13-dbgsym"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-udebs-generic"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-udebs-generic-lpae"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-udebs-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-udebs-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-lts-xenial-udebs-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-tools-4.4.0-13-generic"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-tools-4.4.0-13-generic-lpae"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-tools-4.4.0-13-lowlatency"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-tools-4.4.0-13-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-tools-4.4.0-13-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-tools-4.4.0-13-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "linux-tools-4.4.0-13-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "md-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "md-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "md-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "md-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "md-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "message-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "message-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "message-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "message-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "mouse-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "mouse-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "mouse-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "mouse-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "mouse-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "multipath-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "multipath-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "multipath-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "multipath-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "multipath-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nfs-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nfs-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nfs-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nfs-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nfs-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-pcmcia-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-shared-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-shared-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-shared-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-shared-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-shared-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-usb-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-usb-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-usb-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-usb-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "nic-usb-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "parport-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "parport-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "parport-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "parport-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "parport-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "pata-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "pata-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "pata-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "pata-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "pcmcia-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "pcmcia-storage-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "plip-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "plip-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "plip-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "plip-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "plip-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ppp-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ppp-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ppp-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ppp-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "ppp-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "sata-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "sata-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "sata-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "sata-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "sata-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "scsi-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "scsi-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "scsi-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "scsi-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "scsi-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "serial-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "speakup-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "speakup-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "speakup-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "speakup-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "speakup-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "squashfs-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "squashfs-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "squashfs-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "squashfs-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "squashfs-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "storage-core-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "storage-core-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "storage-core-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "storage-core-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "storage-core-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "usb-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "usb-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "usb-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "usb-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "usb-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "virtio-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "virtio-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "virtio-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "virtio-modules-4.4.0-13-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "vlan-modules-4.4.0-13-generic-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "vlan-modules-4.4.0-13-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "vlan-modules-4.4.0-13-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "vlan-modules-4.4.0-13-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-13.29~14.04.1",
            "binary_name": "vlan-modules-4.4.0-13-powerpc64-smp-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-2.16

Affected versions

4.*

4.2.0-16.19
4.2.0-17.21
4.2.0-19.23
4.3.0-1.10
4.3.0-2.11
4.3.0-5.16
4.3.0-6.17
4.3.0-7.18

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "block-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "block-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "block-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "block-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "block-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "crypto-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "crypto-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "crypto-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "crypto-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "crypto-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "dasd-extra-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "dasd-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fat-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fat-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fat-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fat-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fat-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fb-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "firewire-core-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "firewire-core-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "firewire-core-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "firewire-core-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "floppy-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "floppy-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "floppy-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "floppy-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-core-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-core-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-core-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-core-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-core-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-secondary-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-secondary-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-secondary-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-secondary-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "fs-secondary-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "input-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "input-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "input-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "input-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "input-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ipmi-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ipmi-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ipmi-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ipmi-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ipmi-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "irda-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "irda-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "irda-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "irda-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "irda-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "kernel-image-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "kernel-image-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "kernel-image-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "kernel-image-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "kernel-image-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-cloud-tools-4.4.0-2"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-cloud-tools-4.4.0-2-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-cloud-tools-4.4.0-2-generic"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-cloud-tools-4.4.0-2-lowlatency"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2-generic"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2-generic-lpae"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2-lowlatency"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-headers-4.4.0-2-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-generic"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-generic-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-generic-lpae"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-generic-lpae-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-lowlatency"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-lowlatency-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc-e500mc-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc-smp-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc64-emb-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-4.4.0-2-powerpc64-smp-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-image-extra-4.4.0-2-generic"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-source-4.4.0"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-dbgsym"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-generic"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-generic-lpae"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-lowlatency"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-4.4.0-2-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-udebs-generic"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-udebs-generic-lpae"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-udebs-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-udebs-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "linux-udebs-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "md-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "md-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "md-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "md-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "md-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "message-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "message-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "message-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "message-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "mouse-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "mouse-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "mouse-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "mouse-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "mouse-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "multipath-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "multipath-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "multipath-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "multipath-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "multipath-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nfs-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nfs-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nfs-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nfs-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nfs-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-pcmcia-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-shared-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-shared-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-shared-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-shared-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-shared-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-usb-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-usb-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-usb-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-usb-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "nic-usb-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "parport-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "parport-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "parport-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "parport-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "parport-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "pata-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "pata-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "pata-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "pata-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "pcmcia-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "pcmcia-storage-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "plip-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "plip-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "plip-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "plip-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "plip-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ppp-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ppp-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ppp-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ppp-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "ppp-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "sata-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "sata-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "sata-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "sata-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "sata-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "scsi-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "scsi-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "scsi-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "scsi-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "scsi-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "serial-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "speakup-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "speakup-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "speakup-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "speakup-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "speakup-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "squashfs-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "squashfs-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "squashfs-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "squashfs-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "squashfs-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "storage-core-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "storage-core-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "storage-core-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "storage-core-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "storage-core-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "usb-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "usb-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "usb-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "usb-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "usb-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "virtio-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "virtio-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "virtio-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "virtio-modules-4.4.0-2-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "vlan-modules-4.4.0-2-generic-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "vlan-modules-4.4.0-2-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "vlan-modules-4.4.0-2-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "vlan-modules-4.4.0-2-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-2.16",
            "binary_name": "vlan-modules-4.4.0-2-powerpc64-smp-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1001.10

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-cloud-tools-4.4.0-1001"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-cloud-tools-4.4.0-1001-dbgsym"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-cloud-tools-common"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-headers-4.4.0-1001"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-source-4.4.0"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-tools-4.4.0-1001"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-tools-4.4.0-1001-dbgsym"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-aws-tools-common"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-cloud-tools-4.4.0-1001-aws"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-headers-4.4.0-1001-aws"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-image-4.4.0-1001-aws"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-image-4.4.0-1001-aws-dbgsym"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-image-extra-4.4.0-1001-aws"
        },
        {
            "binary_version": "4.4.0-1001.10",
            "binary_name": "linux-tools-4.4.0-1001-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux-aws-hwe

Package

Name
linux-aws-hwe
Purl
pkg:deb/ubuntu/linux-aws-hwe?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1030.31~16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-aws-headers-4.15.0-1030"
        },
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-aws-hwe-tools-4.15.0-1030"
        },
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-aws-hwe-tools-4.15.0-1030-dbgsym"
        },
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-headers-4.15.0-1030-aws"
        },
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-image-4.15.0-1030-aws"
        },
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-image-4.15.0-1030-aws-dbgsym"
        },
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-modules-4.15.0-1030-aws"
        },
        {
            "binary_version": "4.15.0-1030.31~16.04.1",
            "binary_name": "linux-tools-4.15.0-1030-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.11.0-1009.9

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-azure-cloud-tools-4.11.0-1009"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-azure-cloud-tools-4.11.0-1009-dbgsym"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-azure-headers-4.11.0-1009"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-azure-tools-4.11.0-1009"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-azure-tools-4.11.0-1009-dbgsym"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-cloud-tools-4.11.0-1009-azure"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-headers-4.11.0-1009-azure"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-image-4.11.0-1009-azure"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-image-4.11.0-1009-azure-dbgsym"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-image-extra-4.11.0-1009-azure"
        },
        {
            "binary_version": "4.11.0-1009.9",
            "binary_name": "linux-tools-4.11.0-1009-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.0-1004.4

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-cloud-tools-4.10.0-1004-gcp"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-gcp-cloud-tools-4.10.0-1004"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-gcp-cloud-tools-4.10.0-1004-dbgsym"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-gcp-headers-4.10.0-1004"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-gcp-tools-4.10.0-1004"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-gcp-tools-4.10.0-1004-dbgsym"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-headers-4.10.0-1004-gcp"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-image-4.10.0-1004-gcp"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-image-4.10.0-1004-gcp-dbgsym"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-image-extra-4.10.0-1004-gcp"
        },
        {
            "binary_version": "4.10.0-1004.4",
            "binary_name": "linux-tools-4.10.0-1004-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux-hwe

Package

Name
linux-hwe
Purl
pkg:deb/ubuntu/linux-hwe?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.8.0-39.42~16.04.1

Affected versions

4.*

4.8.0-36.36~16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "block-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "block-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "crypto-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "crypto-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "dasd-extra-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "dasd-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "fat-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "fat-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "fb-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "firewire-core-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "floppy-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "fs-core-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "fs-core-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "fs-secondary-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "fs-secondary-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "input-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "input-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "ipmi-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "ipmi-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "irda-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "irda-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "kernel-image-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "kernel-image-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-cloud-tools-4.8.0-39-generic"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-cloud-tools-4.8.0-39-lowlatency"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-headers-4.8.0-39"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-headers-4.8.0-39-generic"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-headers-4.8.0-39-generic-lpae"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-headers-4.8.0-39-lowlatency"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-hwe-cloud-tools-4.8.0-39"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-hwe-cloud-tools-4.8.0-39-dbgsym"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-hwe-tools-4.8.0-39"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-hwe-tools-4.8.0-39-dbgsym"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-hwe-udebs-generic"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-hwe-udebs-generic-lpae"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-image-4.8.0-39-generic"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-image-4.8.0-39-generic-dbgsym"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-image-4.8.0-39-generic-lpae"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-image-4.8.0-39-generic-lpae-dbgsym"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-image-4.8.0-39-lowlatency"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-image-4.8.0-39-lowlatency-dbgsym"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-image-extra-4.8.0-39-generic"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-source-4.8.0"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-tools-4.8.0-39-generic"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-tools-4.8.0-39-generic-lpae"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "linux-tools-4.8.0-39-lowlatency"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "md-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "md-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "message-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "mouse-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "mouse-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "multipath-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "multipath-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nfs-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nfs-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nic-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nic-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nic-pcmcia-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nic-shared-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nic-shared-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nic-usb-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "nic-usb-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "parport-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "parport-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "pata-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "pcmcia-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "pcmcia-storage-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "plip-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "plip-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "ppp-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "ppp-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "sata-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "sata-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "scsi-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "scsi-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "serial-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "storage-core-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "storage-core-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "usb-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "usb-modules-4.8.0-39-generic-lpae-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "virtio-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "vlan-modules-4.8.0-39-generic-di"
        },
        {
            "binary_version": "4.8.0-39.42~16.04.1",
            "binary_name": "vlan-modules-4.8.0-39-generic-lpae-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1004.9

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-cloud-tools-4.4.0-1004-kvm"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-headers-4.4.0-1004-kvm"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-image-4.4.0-1004-kvm"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-image-4.4.0-1004-kvm-dbgsym"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-kvm-cloud-tools-4.4.0-1004"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-kvm-cloud-tools-4.4.0-1004-dbgsym"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-kvm-headers-4.4.0-1004"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-kvm-tools-4.4.0-1004"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-kvm-tools-4.4.0-1004-dbgsym"
        },
        {
            "binary_version": "4.4.0-1004.9",
            "binary_name": "linux-tools-4.4.0-1004-kvm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:16.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1007.9~16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-buildinfo-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-headers-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-1007-oracle-dbgsym"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-modules-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-modules-extra-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-oracle-headers-4.15.0-1007"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-oracle-tools-4.15.0-1007"
        },
        {
            "binary_version": "4.15.0-1007.9~16.04.1",
            "binary_name": "linux-tools-4.15.0-1007-oracle"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:16.04:LTS / linux-hwe-edge

Package

Name
linux-hwe-edge
Purl
pkg:deb/ubuntu/linux-hwe-edge?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.8.0-28.30~16.04.1
4.8.0-30.32~16.04.1
4.8.0-32.34~16.04.1
4.8.0-34.36~16.04.1
4.10.0-14.16~16.04.1
4.10.0-19.21~16.04.1
4.10.0-20.22~16.04.1
4.10.0-21.23~16.04.1
4.10.0-22.24~16.04.1
4.10.0-24.28~16.04.1
4.10.0-26.30~16.04.1
4.11.0-13.19~16.04.1
4.11.0-14.20~16.04.1
4.13.0-16.19~16.04.3
4.13.0-17.20~16.04.1
4.13.0-19.22~16.04.1
4.13.0-21.24~16.04.1
4.13.0-25.29~16.04.2
4.15.0-13.14~16.04.1
4.15.0-15.16~16.04.1
4.15.0-20.21~16.04.1
4.15.0-22.24~16.04.1
4.15.0-23.25~16.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:16.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips-updates/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1003.3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "block-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "crypto-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "dasd-extra-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "dasd-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "fat-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "fb-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "firewire-core-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "floppy-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "fs-core-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "fs-secondary-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "input-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "ipmi-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "irda-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "kernel-image-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-fips-cloud-tools-common"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-fips-headers-4.4.0-1003"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-fips-source-4.4.0"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-fips-tools-4.4.0-1003"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-fips-tools-4.4.0-1003-dbgsym"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-headers-4.4.0-1003-fips"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-image-4.4.0-1003-fips"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-image-4.4.0-1003-fips-dbgsym"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-image-extra-4.4.0-1003-fips"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-image-hmac-4.4.0-1003-fips"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-tools-4.4.0-1003-fips"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "linux-udebs-fips"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "md-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "message-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "mouse-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "multipath-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "nfs-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "nic-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "nic-pcmcia-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "nic-shared-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "nic-usb-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "parport-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "pata-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "pcmcia-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "pcmcia-storage-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "plip-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "ppp-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "sata-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "scsi-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "serial-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "speakup-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "storage-core-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "usb-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "virtio-modules-4.4.0-1003-fips-di"
        },
        {
            "binary_version": "4.4.0-1003.3",
            "binary_name": "vlan-modules-4.4.0-1003-fips-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:16.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1001.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "block-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "crypto-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "dasd-extra-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "dasd-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "fat-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "fb-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "firewire-core-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "floppy-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "fs-core-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "fs-secondary-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "input-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "ipmi-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "irda-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "kernel-image-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-fips-headers-4.4.0-1001"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-fips-source-4.4.0"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-fips-tools-4.4.0-1001"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-fips-tools-4.4.0-1001-dbgsym"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-headers-4.4.0-1001-fips"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-image-4.4.0-1001-fips"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-image-4.4.0-1001-fips-dbgsym"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-image-extra-4.4.0-1001-fips"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-image-hmac-4.4.0-1001-fips"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-tools-4.4.0-1001-fips"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "linux-udebs-fips"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "md-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "message-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "mouse-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "multipath-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "nfs-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "nic-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "nic-pcmcia-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "nic-shared-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "nic-usb-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "parport-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "pata-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "pcmcia-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "pcmcia-storage-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "plip-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "ppp-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "sata-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "scsi-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "serial-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "speakup-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "storage-core-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "usb-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "virtio-modules-4.4.0-1001-fips-di"
        },
        {
            "binary_version": "4.4.0-1001.1",
            "binary_name": "vlan-modules-4.4.0-1001-fips-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.13.0-16.19

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "block-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "block-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "crypto-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "crypto-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "dasd-extra-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "dasd-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "fat-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "fat-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "fb-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "firewire-core-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "floppy-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "fs-core-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "fs-core-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "fs-secondary-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "fs-secondary-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "input-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "input-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "ipmi-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "ipmi-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "irda-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "irda-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "kernel-image-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "kernel-image-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-cloud-tools-4.13.0-16"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-cloud-tools-4.13.0-16-dbgsym"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-cloud-tools-4.13.0-16-generic"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-cloud-tools-4.13.0-16-lowlatency"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-headers-4.13.0-16"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-headers-4.13.0-16-generic"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-headers-4.13.0-16-generic-lpae"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-headers-4.13.0-16-lowlatency"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-image-4.13.0-16-generic"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-image-4.13.0-16-generic-dbgsym"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-image-4.13.0-16-generic-lpae"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-image-4.13.0-16-generic-lpae-dbgsym"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-image-4.13.0-16-lowlatency"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-image-4.13.0-16-lowlatency-dbgsym"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-image-extra-4.13.0-16-generic"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-source-4.13.0"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-tools-4.13.0-16"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-tools-4.13.0-16-dbgsym"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-tools-4.13.0-16-generic"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-tools-4.13.0-16-generic-lpae"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-tools-4.13.0-16-lowlatency"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-udebs-generic"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "linux-udebs-generic-lpae"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "md-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "md-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "message-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "mouse-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "mouse-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "multipath-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "multipath-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nfs-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nfs-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nic-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nic-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nic-pcmcia-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nic-shared-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nic-shared-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nic-usb-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "nic-usb-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "parport-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "parport-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "pata-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "pcmcia-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "pcmcia-storage-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "plip-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "plip-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "ppp-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "ppp-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "sata-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "sata-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "scsi-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "scsi-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "serial-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "storage-core-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "storage-core-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "usb-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "usb-modules-4.13.0-16-generic-lpae-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "virtio-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "vlan-modules-4.13.0-16-generic-di"
        },
        {
            "binary_version": "4.13.0-16.19",
            "binary_name": "vlan-modules-4.13.0-16-generic-lpae-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1001.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-aws-cloud-tools-4.15.0-1001"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-aws-cloud-tools-4.15.0-1001-dbgsym"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-aws-headers-4.15.0-1001"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-aws-tools-4.15.0-1001"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-aws-tools-4.15.0-1001-dbgsym"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-cloud-tools-4.15.0-1001-aws"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-headers-4.15.0-1001-aws"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-image-4.15.0-1001-aws"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-image-4.15.0-1001-aws-dbgsym"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-tools-4.15.0-1001-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-aws-5.4

Package

Name
linux-aws-5.4
Purl
pkg:deb/ubuntu/linux-aws-5.4?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1018.18~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1018"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-aws-5.4-headers-5.4.0-1018"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-aws-5.4-tools-5.4.0-1018"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-1018-aws"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-cloud-tools-5.4.0-1018-aws"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-headers-5.4.0-1018-aws"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-image-5.4.0-1018-aws"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-image-5.4.0-1018-aws-dbgsym"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-modules-5.4.0-1018-aws"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-modules-extra-5.4.0-1018-aws"
        },
        {
            "binary_version": "5.4.0-1018.18~18.04.1",
            "binary_name": "linux-tools-5.4.0-1018-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-azure-4.15

Package

Name
linux-azure-4.15
Purl
pkg:deb/ubuntu/linux-azure-4.15?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1082.92

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1082"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-azure-4.15-headers-4.15.0-1082"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-azure-4.15-tools-4.15.0-1082"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-buildinfo-4.15.0-1082-azure"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-cloud-tools-4.15.0-1082-azure"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-headers-4.15.0-1082-azure"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-image-unsigned-4.15.0-1082-azure"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-image-unsigned-4.15.0-1082-azure-dbgsym"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-modules-4.15.0-1082-azure"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-modules-extra-4.15.0-1082-azure"
        },
        {
            "binary_version": "4.15.0-1082.92",
            "binary_name": "linux-tools-4.15.0-1082-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-azure-5.4

Package

Name
linux-azure-5.4
Purl
pkg:deb/ubuntu/linux-azure-5.4?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1020.20~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1020"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-azure-5.4-headers-5.4.0-1020"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-azure-5.4-tools-5.4.0-1020"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-1020-azure"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-cloud-tools-5.4.0-1020-azure"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-headers-5.4.0-1020-azure"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-1020-azure"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-1020-azure-dbgsym"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-modules-5.4.0-1020-azure"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-modules-extra-5.4.0-1020-azure"
        },
        {
            "binary_version": "5.4.0-1020.20~18.04.1",
            "binary_name": "linux-tools-5.4.0-1020-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-gcp-4.15

Package

Name
linux-gcp-4.15
Purl
pkg:deb/ubuntu/linux-gcp-4.15?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1071.81

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-buildinfo-4.15.0-1071-gcp"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-gcp-4.15-headers-4.15.0-1071"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-gcp-4.15-tools-4.15.0-1071"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-headers-4.15.0-1071-gcp"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-image-unsigned-4.15.0-1071-gcp"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-image-unsigned-4.15.0-1071-gcp-dbgsym"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-modules-4.15.0-1071-gcp"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-modules-extra-4.15.0-1071-gcp"
        },
        {
            "binary_version": "4.15.0-1071.81",
            "binary_name": "linux-tools-4.15.0-1071-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-gcp-5.4

Package

Name
linux-gcp-5.4
Purl
pkg:deb/ubuntu/linux-gcp-5.4?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1019.19~18.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-buildinfo-5.4.0-1019-gcp"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-gcp-5.4-headers-5.4.0-1019"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-gcp-5.4-tools-5.4.0-1019"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-headers-5.4.0-1019-gcp"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-image-unsigned-5.4.0-1019-gcp"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-image-unsigned-5.4.0-1019-gcp-dbgsym"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-modules-5.4.0-1019-gcp"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-modules-extra-5.4.0-1019-gcp"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.2",
            "binary_name": "linux-tools-5.4.0-1019-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-hwe-5.4

Package

Name
linux-hwe-5.4
Purl
pkg:deb/ubuntu/linux-hwe-5.4?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-37.41~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "block-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "block-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "crypto-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "crypto-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "dasd-extra-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "dasd-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "fat-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "fat-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "fb-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "firewire-core-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "floppy-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "fs-core-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "fs-core-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "fs-secondary-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "fs-secondary-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "input-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "input-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "ipmi-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "ipmi-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "kernel-image-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "kernel-image-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-37-generic-lpae"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-37-lowlatency"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-cloud-tools-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-cloud-tools-5.4.0-37-lowlatency"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-headers-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-headers-5.4.0-37-generic-lpae"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-headers-5.4.0-37-lowlatency"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-37"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-cloud-tools-common"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-headers-5.4.0-37"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-source-5.4.0"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-tools-5.4.0-37"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-tools-common"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-udebs-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-hwe-5.4-udebs-generic-lpae"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-5.4.0-37-generic-dbgsym"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-5.4.0-37-generic-lpae"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-5.4.0-37-generic-lpae-dbgsym"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-5.4.0-37-lowlatency"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-5.4.0-37-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-37-generic-dbgsym"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-37-lowlatency"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-37-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-modules-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-modules-5.4.0-37-generic-lpae"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-modules-5.4.0-37-lowlatency"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-modules-extra-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-tools-5.4.0-37-generic"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-tools-5.4.0-37-generic-lpae"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "linux-tools-5.4.0-37-lowlatency"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "md-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "md-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "message-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "mouse-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "mouse-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "multipath-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "multipath-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nfs-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nfs-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nic-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nic-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nic-pcmcia-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nic-shared-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nic-shared-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nic-usb-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "nic-usb-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "parport-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "parport-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "pata-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "pcmcia-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "pcmcia-storage-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "plip-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "plip-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "ppp-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "ppp-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "sata-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "sata-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "scsi-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "scsi-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "serial-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "storage-core-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "storage-core-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "usb-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "usb-modules-5.4.0-37-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "virtio-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "vlan-modules-5.4.0-37-generic-di"
        },
        {
            "binary_version": "5.4.0-37.41~18.04.1",
            "binary_name": "vlan-modules-5.4.0-37-generic-lpae-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-hwe-edge

Package

Name
linux-hwe-edge
Purl
pkg:deb/ubuntu/linux-hwe-edge?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.0-15.16~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "block-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "block-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "crypto-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "crypto-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "dasd-extra-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "dasd-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "fat-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "fat-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "fb-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "firewire-core-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "floppy-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "fs-core-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "fs-core-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "fs-secondary-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "fs-secondary-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "input-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "input-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "ipmi-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "ipmi-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "kernel-image-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "kernel-image-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-buildinfo-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-buildinfo-5.0.0-15-generic-lpae"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-buildinfo-5.0.0-15-lowlatency"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-cloud-tools-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-cloud-tools-5.0.0-15-lowlatency"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-headers-5.0.0-15"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-headers-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-headers-5.0.0-15-generic-lpae"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-headers-5.0.0-15-lowlatency"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-hwe-edge-cloud-tools-5.0.0-15"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-hwe-edge-tools-5.0.0-15"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-hwe-edge-udebs-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-hwe-edge-udebs-generic-lpae"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-5.0.0-15-generic-dbgsym"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-5.0.0-15-generic-lpae"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-5.0.0-15-generic-lpae-dbgsym"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-5.0.0-15-lowlatency"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-5.0.0-15-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-unsigned-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-unsigned-5.0.0-15-generic-dbgsym"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-unsigned-5.0.0-15-lowlatency"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-image-unsigned-5.0.0-15-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-modules-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-modules-5.0.0-15-generic-lpae"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-modules-5.0.0-15-lowlatency"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-modules-extra-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-source-5.0.0"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-tools-5.0.0-15-generic"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-tools-5.0.0-15-generic-lpae"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "linux-tools-5.0.0-15-lowlatency"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "md-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "md-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "message-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "mouse-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "mouse-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "multipath-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "multipath-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nfs-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nfs-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nic-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nic-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nic-pcmcia-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nic-shared-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nic-shared-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nic-usb-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "nic-usb-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "parport-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "parport-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "pata-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "pcmcia-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "pcmcia-storage-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "plip-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "plip-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "ppp-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "ppp-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "sata-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "sata-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "scsi-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "scsi-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "serial-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "storage-core-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "storage-core-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "usb-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "usb-modules-5.0.0-15-generic-lpae-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "virtio-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "vlan-modules-5.0.0-15-generic-di"
        },
        {
            "binary_version": "5.0.0-15.16~18.04.1",
            "binary_name": "vlan-modules-5.0.0-15-generic-lpae-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-ibm-5.4

Package

Name
linux-ibm-5.4
Purl
pkg:deb/ubuntu/linux-ibm-5.4?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1010.11~18.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-buildinfo-5.4.0-1010-ibm"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-headers-5.4.0-1010-ibm"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-ibm-5.4-cloud-tools-common"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-ibm-5.4-headers-5.4.0-1010"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-ibm-5.4-source-5.4.0"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-ibm-5.4-tools-5.4.0-1010"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-ibm-5.4-tools-common"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-image-unsigned-5.4.0-1010-ibm"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-image-unsigned-5.4.0-1010-ibm-dbgsym"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-modules-5.4.0-1010-ibm"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-modules-extra-5.4.0-1010-ibm"
        },
        {
            "binary_version": "5.4.0-1010.11~18.04.2",
            "binary_name": "linux-tools-5.4.0-1010-ibm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1002.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-cloud-tools-4.15.0-1002-kvm"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-headers-4.15.0-1002-kvm"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-4.15.0-1002-kvm"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-4.15.0-1002-kvm-dbgsym"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-kvm-cloud-tools-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-kvm-cloud-tools-4.15.0-1002-dbgsym"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-kvm-headers-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-kvm-tools-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-kvm-tools-4.15.0-1002-dbgsym"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-tools-4.15.0-1002-kvm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1007.9

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-buildinfo-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-headers-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-image-unsigned-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-image-unsigned-4.15.0-1007-oracle-dbgsym"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-modules-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-modules-extra-4.15.0-1007-oracle"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-oracle-headers-4.15.0-1007"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-oracle-tools-4.15.0-1007"
        },
        {
            "binary_version": "4.15.0-1007.9",
            "binary_name": "linux-tools-4.15.0-1007-oracle"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-oracle-5.4

Package

Name
linux-oracle-5.4
Purl
pkg:deb/ubuntu/linux-oracle-5.4?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1019.19~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-1019-oracle"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-headers-5.4.0-1019-oracle"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-1019-oracle"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-image-unsigned-5.4.0-1019-oracle-dbgsym"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-modules-5.4.0-1019-oracle"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-modules-extra-5.4.0-1019-oracle"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-oracle-5.4-headers-5.4.0-1019"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-oracle-5.4-tools-5.4.0-1019"
        },
        {
            "binary_version": "5.4.0-1019.19~18.04.1",
            "binary_name": "linux-tools-5.4.0-1019-oracle"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:18.04:LTS / linux-raspi-5.4

Package

Name
linux-raspi-5.4
Purl
pkg:deb/ubuntu/linux-raspi-5.4?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1013.13~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-buildinfo-5.4.0-1013-raspi"
        },
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-headers-5.4.0-1013-raspi"
        },
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-image-5.4.0-1013-raspi"
        },
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-image-5.4.0-1013-raspi-dbgsym"
        },
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-modules-5.4.0-1013-raspi"
        },
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-raspi-5.4-headers-5.4.0-1013"
        },
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-raspi-5.4-tools-5.4.0-1013"
        },
        {
            "binary_version": "5.4.0-1013.13~18.04.1",
            "binary_name": "linux-tools-5.4.0-1013-raspi"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-aws-5.0

Package

Name
linux-aws-5.0
Purl
pkg:deb/ubuntu/linux-aws-5.0?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-1021.24~18.04.1
5.0.0-1022.25~18.04.1
5.0.0-1023.26~18.04.1
5.0.0-1024.27~18.04.1
5.0.0-1025.28
5.0.0-1027.30

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-aws-5.3

Package

Name
linux-aws-5.3
Purl
pkg:deb/ubuntu/linux-aws-5.3?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1016.17~18.04.1
5.3.0-1017.18~18.04.1
5.3.0-1019.21~18.04.1
5.3.0-1023.25~18.04.1
5.3.0-1028.30~18.04.1
5.3.0-1030.32~18.04.1
5.3.0-1032.34~18.04.2
5.3.0-1033.35
5.3.0-1034.36
5.3.0-1035.37

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1002.2
4.15.0-1003.3
4.15.0-1004.4
4.15.0-1008.8
4.15.0-1009.9
4.15.0-1012.12
4.15.0-1013.13
4.15.0-1014.14
4.15.0-1018.18
4.15.0-1019.19
4.15.0-1021.21
4.15.0-1022.23
4.15.0-1023.24
4.15.0-1025.26
4.15.0-1028.29
4.15.0-1030.31
4.15.0-1031.32
4.15.0-1032.33
4.15.0-1035.36
4.15.0-1036.38
4.15.0-1037.39
4.18.0-1011.11~18.04.1
4.18.0-1013.13~18.04.1
4.18.0-1014.14~18.04.1
4.18.0-1018.18~18.04.1
4.18.0-1019.19~18.04.1
4.18.0-1020.20~18.04.1
4.18.0-1023.24~18.04.1
4.18.0-1024.25~18.04.1
4.18.0-1025.27~18.04.1

5.*

5.0.0-1014.14~18.04.1
5.0.0-1016.17~18.04.1
5.0.0-1018.19~18.04.1
5.0.0-1020.21~18.04.1
5.0.0-1022.23~18.04.1
5.0.0-1023.24~18.04.1
5.0.0-1025.27~18.04.1
5.0.0-1027.29~18.04.1
5.0.0-1028.30~18.04.1
5.0.0-1029.31~18.04.1
5.0.0-1031.33
5.0.0-1032.34
5.0.0-1035.37
5.0.0-1036.38

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-azure-5.3

Package

Name
linux-azure-5.3
Purl
pkg:deb/ubuntu/linux-azure-5.3?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1007.8~18.04.1
5.3.0-1008.9~18.04.1
5.3.0-1009.10~18.04.1
5.3.0-1010.11~18.04.1
5.3.0-1012.13~18.04.1
5.3.0-1013.14~18.04.1
5.3.0-1016.17~18.04.1
5.3.0-1018.19~18.04.1
5.3.0-1019.20~18.04.1
5.3.0-1020.21~18.04.1
5.3.0-1022.23~18.04.1
5.3.0-1028.29~18.04.1
5.3.0-1031.32~18.04.1
5.3.0-1032.33~18.04.1
5.3.0-1034.35~18.04.1
5.3.0-1035.36

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-azure-edge

Package

Name
linux-azure-edge
Purl
pkg:deb/ubuntu/linux-azure-edge?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.18.0-1006.6~18.04.1
4.18.0-1007.7~18.04.1
4.18.0-1008.8~18.04.1

5.*

5.0.0-1012.12~18.04.2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1001.1
4.15.0-1003.3
4.15.0-1005.5
4.15.0-1006.6
4.15.0-1008.8
4.15.0-1009.9
4.15.0-1010.10
4.15.0-1014.14
4.15.0-1015.15
4.15.0-1017.18
4.15.0-1018.19
4.15.0-1019.20
4.15.0-1021.22
4.15.0-1023.24
4.15.0-1024.25
4.15.0-1025.26
4.15.0-1026.27
4.15.0-1027.28
4.15.0-1028.29
4.15.0-1029.31
4.15.0-1030.32
4.15.0-1032.34
4.15.0-1033.35
4.15.0-1034.36
4.15.0-1036.38
4.15.0-1037.39
4.15.0-1040.42
4.15.0-1042.45
4.15.0-1044.70

5.*

5.0.0-1020.20~18.04.1
5.0.0-1021.21~18.04.1
5.0.0-1025.26~18.04.1
5.0.0-1026.27~18.04.1
5.0.0-1028.29~18.04.1
5.0.0-1029.30~18.04.1
5.0.0-1031.32
5.0.0-1033.34
5.0.0-1034.35

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-gcp-5.3

Package

Name
linux-gcp-5.3
Purl
pkg:deb/ubuntu/linux-gcp-5.3?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1008.9~18.04.1
5.3.0-1009.10~18.04.1
5.3.0-1010.11~18.04.1
5.3.0-1012.13~18.04.1
5.3.0-1014.15~18.04.1
5.3.0-1016.17~18.04.1
5.3.0-1017.18~18.04.1
5.3.0-1018.19~18.04.1
5.3.0-1020.22~18.04.1
5.3.0-1026.28~18.04.1
5.3.0-1029.31~18.04.1
5.3.0-1030.32~18.04.1
5.3.0-1032.34~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-gke-4.15

Package

Name
linux-gke-4.15
Purl
pkg:deb/ubuntu/linux-gke-4.15?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1030.32
4.15.0-1032.34
4.15.0-1033.35
4.15.0-1034.36
4.15.0-1036.38
4.15.0-1037.39
4.15.0-1040.42
4.15.0-1041.43
4.15.0-1042.44
4.15.0-1044.46
4.15.0-1045.48
4.15.0-1046.49
4.15.0-1048.51
4.15.0-1049.52
4.15.0-1050.53
4.15.0-1052.55
4.15.0-1055.58
4.15.0-1057.60
4.15.0-1058.61
4.15.0-1059.62
4.15.0-1063.66
4.15.0-1064.67
4.15.0-1066.69
4.15.0-1067.70
4.15.0-1069.72
4.15.0-1070.73
4.15.0-1072.76
4.15.0-1073.78
4.15.0-1074.79
4.15.0-1076.81
4.15.0-1077.82
4.15.0-1078.83
4.15.0-1079.84

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-gke-5.4

Package

Name
linux-gke-5.4
Purl
pkg:deb/ubuntu/linux-gke-5.4?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1025.25~18.04.1
5.4.0-1027.28~18.04.1
5.4.0-1029.31~18.04.1
5.4.0-1030.32~18.04.1
5.4.0-1032.34~18.04.1
5.4.0-1033.35~18.04.1
5.4.0-1035.37~18.04.1
5.4.0-1036.38~18.04.1
5.4.0-1037.39~18.04.1
5.4.0-1039.41~18.04.1
5.4.0-1040.42~18.04.1
5.4.0-1042.44~18.04.1
5.4.0-1043.45~18.04.1
5.4.0-1044.46~18.04.1
5.4.0-1046.48~18.04.1
5.4.0-1049.52~18.04.1
5.4.0-1051.54~18.04.1
5.4.0-1052.55~18.04.1
5.4.0-1053.56~18.04.1
5.4.0-1054.57~18.04.1
5.4.0-1055.58~18.04.1
5.4.0-1056.59~18.04.1
5.4.0-1057.60~18.04.1
5.4.0-1059.62~18.04.1
5.4.0-1061.64~18.04.1
5.4.0-1062.65~18.04.1
5.4.0-1063.66~18.04.1
5.4.0-1065.68~18.04.1
5.4.0-1066.69~18.04.1
5.4.0-1067.70~18.04.1
5.4.0-1068.71~18.04.1
5.4.0-1071.76~18.04.3
5.4.0-1072.77~18.04.1
5.4.0-1074.79~18.04.1
5.4.0-1076.82~18.04.1
5.4.0-1078.84~18.04.1
5.4.0-1080.86~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-gkeop-5.4

Package

Name
linux-gkeop-5.4
Purl
pkg:deb/ubuntu/linux-gkeop-5.4?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1001.1
5.4.0-1003.3
5.4.0-1004.5
5.4.0-1005.6
5.4.0-1007.8~18.04.1
5.4.0-1008.9~18.04.1
5.4.0-1009.10~18.04.1
5.4.0-1010.11~18.04.1
5.4.0-1011.12~18.04.2
5.4.0-1012.13~18.04.1
5.4.0-1013.14~18.04.1
5.4.0-1014.15~18.04.1
5.4.0-1015.16~18.04.1
5.4.0-1016.17~18.04.1
5.4.0-1018.19~18.04.1
5.4.0-1021.22~18.04.1
5.4.0-1022.23~18.04.1
5.4.0-1023.24~18.04.1
5.4.0-1024.25~18.04.1
5.4.0-1025.26~18.04.1
5.4.0-1026.27~18.04.1
5.4.0-1027.28~18.04.1
5.4.0-1029.30~18.04.2
5.4.0-1031.32~18.04.1
5.4.0-1032.33~18.04.1
5.4.0-1033.34~18.04.1
5.4.0-1034.35~18.04.1
5.4.0-1036.37~18.04.1
5.4.0-1037.38~18.04.1
5.4.0-1038.39~18.04.1
5.4.0-1039.40~18.04.1
5.4.0-1040.41~18.04.1
5.4.0-1043.44~18.04.1
5.4.0-1046.48~18.04.1
5.4.0-1048.51~18.04.1
5.4.0-1049.52~18.04.1
5.4.0-1051.54~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-hwe

Package

Name
linux-hwe
Purl
pkg:deb/ubuntu/linux-hwe?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.18.0-13.14~18.04.1
4.18.0-14.15~18.04.1
4.18.0-15.16~18.04.1
4.18.0-16.17~18.04.1
4.18.0-17.18~18.04.1
4.18.0-18.19~18.04.1
4.18.0-20.21~18.04.1
4.18.0-21.22~18.04.1
4.18.0-22.23~18.04.1
4.18.0-24.25~18.04.1
4.18.0-25.26~18.04.1

5.*

5.0.0-23.24~18.04.1
5.0.0-25.26~18.04.1
5.0.0-27.28~18.04.1
5.0.0-29.31~18.04.1
5.0.0-31.33~18.04.1
5.0.0-32.34~18.04.2
5.0.0-35.38~18.04.1
5.0.0-36.39~18.04.1
5.0.0-37.40~18.04.1
5.3.0-26.28~18.04.1
5.3.0-28.30~18.04.1
5.3.0-40.32~18.04.1
5.3.0-42.34~18.04.1
5.3.0-45.37~18.04.1
5.3.0-46.38~18.04.1
5.3.0-51.44~18.04.2
5.3.0-53.47~18.04.1
5.3.0-59.53~18.04.1
5.3.0-61.55~18.04.1
5.3.0-62.56~18.04.1
5.3.0-64.58~18.04.1
5.3.0-65.59
5.3.0-66.60
5.3.0-67.61
5.3.0-68.63
5.3.0-69.65
5.3.0-70.66
5.3.0-72.68
5.3.0-73.69
5.3.0-74.70
5.3.0-75.71
5.3.0-76.72

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-hwe-edge

Package

Name
linux-hwe-edge
Purl
pkg:deb/ubuntu/linux-hwe-edge?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-15.16~18.04.1
5.0.0-16.17~18.04.1
5.0.0-17.18~18.04.1
5.0.0-19.20~18.04.1
5.0.0-20.21~18.04.1
5.3.0-19.20~18.04.2
5.3.0-22.24~18.04.1
5.3.0-23.25~18.04.1
5.3.0-23.25~18.04.2
5.3.0-24.26~18.04.2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-oem

Package

Name
linux-oem
Purl
pkg:deb/ubuntu/linux-oem?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-1002.3
4.15.0-1004.5
4.15.0-1006.9
4.15.0-1008.11
4.15.0-1009.12
4.15.0-1012.15
4.15.0-1013.16
4.15.0-1015.18
4.15.0-1017.20
4.15.0-1018.21
4.15.0-1021.24
4.15.0-1024.29
4.15.0-1026.31
4.15.0-1028.33
4.15.0-1030.35
4.15.0-1033.38
4.15.0-1034.39
4.15.0-1035.40
4.15.0-1036.41
4.15.0-1038.43
4.15.0-1039.44
4.15.0-1043.48
4.15.0-1045.50
4.15.0-1050.57
4.15.0-1056.65
4.15.0-1057.66
4.15.0-1059.68
4.15.0-1063.72
4.15.0-1064.73
4.15.0-1065.75
4.15.0-1066.76
4.15.0-1067.77
4.15.0-1069.79
4.15.0-1073.83
4.15.0-1076.86
4.15.0-1079.89
4.15.0-1080.90
4.15.0-1081.91
4.15.0-1087.97
4.15.0-1090.100
4.15.0-1091.101
4.15.0-1093.103
4.15.0-1094.104
4.15.0-1096.106
4.15.0-1097.107
4.15.0-1099.109
4.15.0-1100.110
4.15.0-1101.112
4.15.0-1102.113
4.15.0-1103.114

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-oracle-5.0

Package

Name
linux-oracle-5.0
Purl
pkg:deb/ubuntu/linux-oracle-5.0?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.0-1007.12~18.04.1
5.0.0-1008.13~18.04.1
5.0.0-1009.14~18.04.1
5.0.0-1010.15~18.04.1
5.0.0-1011.16
5.0.0-1013.18
5.0.0-1014.19

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:18.04:LTS / linux-oracle-5.3

Package

Name
linux-oracle-5.3
Purl
pkg:deb/ubuntu/linux-oracle-5.3?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1011.12~18.04.1
5.3.0-1013.14~18.04.1
5.3.0-1014.15~18.04.1
5.3.0-1016.18~18.04.1
5.3.0-1018.20~18.04.1
5.3.0-1024.26~18.04.1
5.3.0-1027.29~18.04.1
5.3.0-1028.30~18.04.1
5.3.0-1030.32~18.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:18.04:LTS / linux-aws-fips

Package

Name
linux-aws-fips
Purl
pkg:deb/ubuntu/linux-aws-fips?arch=src?distro=fips-updates/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-2000.4

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-aws-fips-headers-4.15.0-2000"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-aws-fips-tools-4.15.0-2000"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-buildinfo-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-headers-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-modules-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-modules-extra-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-tools-4.15.0-2000-aws-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:18.04:LTS / linux-azure-fips

Package

Name
linux-azure-fips
Purl
pkg:deb/ubuntu/linux-azure-fips?arch=src?distro=fips-updates/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1002.2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-azure-fips-headers-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-azure-fips-tools-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-buildinfo-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-headers-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-modules-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-modules-extra-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-tools-4.15.0-1002-azure-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:18.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips-updates/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1027.32

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-buildinfo-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-fips-headers-4.15.0-1027"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-fips-tools-4.15.0-1027"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-fips-tools-host"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-headers-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-image-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-image-4.15.0-1027-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-image-hmac-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-image-unsigned-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-image-unsigned-4.15.0-1027-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-modules-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-modules-extra-4.15.0-1027-fips"
        },
        {
            "binary_version": "4.15.0-1027.32",
            "binary_name": "linux-tools-4.15.0-1027-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:18.04:LTS / linux-gcp-fips

Package

Name
linux-gcp-fips
Purl
pkg:deb/ubuntu/linux-gcp-fips?arch=src?distro=fips-updates/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-2013.14

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-buildinfo-4.15.0-2013-gcp-fips"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-gcp-fips-headers-4.15.0-2013"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-gcp-fips-tools-4.15.0-2013"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-headers-4.15.0-2013-gcp-fips"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-image-unsigned-4.15.0-2013-gcp-fips"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-image-unsigned-4.15.0-2013-gcp-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-2013-gcp-fips"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-modules-4.15.0-2013-gcp-fips"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-modules-extra-4.15.0-2013-gcp-fips"
        },
        {
            "binary_version": "4.15.0-2013.14",
            "binary_name": "linux-tools-4.15.0-2013-gcp-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:18.04:LTS / linux-aws-fips

Package

Name
linux-aws-fips
Purl
pkg:deb/ubuntu/linux-aws-fips?arch=src?distro=fips/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-2000.4

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-aws-fips-headers-4.15.0-2000"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-aws-fips-tools-4.15.0-2000"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-buildinfo-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-headers-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-modules-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-modules-extra-4.15.0-2000-aws-fips"
        },
        {
            "binary_version": "4.15.0-2000.4",
            "binary_name": "linux-tools-4.15.0-2000-aws-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:18.04:LTS / linux-azure-fips

Package

Name
linux-azure-fips
Purl
pkg:deb/ubuntu/linux-azure-fips?arch=src?distro=fips/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1002.2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-azure-fips-headers-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-azure-fips-tools-4.15.0-1002"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-buildinfo-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-headers-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-modules-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-modules-extra-4.15.0-1002-azure-fips"
        },
        {
            "binary_version": "4.15.0-1002.2",
            "binary_name": "linux-tools-4.15.0-1002-azure-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:18.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1011.12

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-buildinfo-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-fips-headers-4.15.0-1011"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-fips-tools-4.15.0-1011"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-fips-tools-host"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-headers-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-image-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-image-4.15.0-1011-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-image-hmac-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-image-unsigned-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-image-unsigned-4.15.0-1011-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-modules-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-modules-extra-4.15.0-1011-fips"
        },
        {
            "binary_version": "4.15.0-1011.12",
            "binary_name": "linux-tools-4.15.0-1011-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:18.04:LTS / linux-gcp-fips

Package

Name
linux-gcp-fips
Purl
pkg:deb/ubuntu/linux-gcp-fips?arch=src?distro=fips/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1001.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-buildinfo-4.15.0-1001-gcp-fips"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-gcp-fips-headers-4.15.0-1001"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-gcp-fips-tools-4.15.0-1001"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-headers-4.15.0-1001-gcp-fips"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips-dbgsym"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-image-unsigned-hmac-4.15.0-1001-gcp-fips"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-modules-4.15.0-1001-gcp-fips"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-modules-extra-4.15.0-1001-gcp-fips"
        },
        {
            "binary_version": "4.15.0-1001.1",
            "binary_name": "linux-tools-4.15.0-1001-gcp-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-9.12

Affected versions

5.*

5.3.0-18.19
5.3.0-24.26

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "block-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "block-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "crypto-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "crypto-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "dasd-extra-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "dasd-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "fat-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "fat-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "fb-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "firewire-core-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "floppy-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "fs-core-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "fs-core-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "fs-secondary-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "fs-secondary-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "input-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "input-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "ipmi-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "ipmi-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "kernel-image-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "kernel-image-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-buildinfo-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-buildinfo-5.4.0-9-generic-lpae"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-buildinfo-5.4.0-9-lowlatency"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-buildinfo-5.4.0-9-snapdragon"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-cloud-tools-5.4.0-9"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-cloud-tools-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-cloud-tools-5.4.0-9-lowlatency"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-headers-5.4.0-9"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-headers-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-headers-5.4.0-9-generic-lpae"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-headers-5.4.0-9-lowlatency"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-headers-5.4.0-9-snapdragon"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-5.4.0-9-generic-dbgsym"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-5.4.0-9-generic-lpae"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-5.4.0-9-generic-lpae-dbgsym"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-unsigned-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-unsigned-5.4.0-9-generic-dbgsym"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-unsigned-5.4.0-9-lowlatency"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-unsigned-5.4.0-9-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-unsigned-5.4.0-9-snapdragon"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-image-unsigned-5.4.0-9-snapdragon-dbgsym"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-modules-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-modules-5.4.0-9-generic-lpae"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-modules-5.4.0-9-lowlatency"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-modules-5.4.0-9-snapdragon"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-modules-extra-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-source-5.4.0"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-tools-5.4.0-9"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-tools-5.4.0-9-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-tools-5.4.0-9-generic-lpae"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-tools-5.4.0-9-lowlatency"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-tools-5.4.0-9-snapdragon"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-tools-host"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-udebs-generic"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "linux-udebs-generic-lpae"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "md-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "md-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "message-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "mouse-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "mouse-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "multipath-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "multipath-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nfs-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nfs-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nic-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nic-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nic-pcmcia-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nic-shared-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nic-shared-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nic-usb-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "nic-usb-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "parport-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "parport-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "pata-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "pcmcia-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "pcmcia-storage-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "plip-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "plip-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "ppp-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "ppp-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "sata-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "sata-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "scsi-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "scsi-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "serial-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "storage-core-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "storage-core-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "usb-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "usb-modules-5.4.0-9-generic-lpae-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "virtio-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "vlan-modules-5.4.0-9-generic-di"
        },
        {
            "binary_version": "5.4.0-9.12",
            "binary_name": "vlan-modules-5.4.0-9-generic-lpae-di"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1005.5

Affected versions

5.*

5.3.0-1003.3
5.3.0-1008.9
5.3.0-1009.10
5.3.0-1010.11

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-aws-cloud-tools-5.4.0-1005"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-aws-headers-5.4.0-1005"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-aws-tools-5.4.0-1005"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-buildinfo-5.4.0-1005-aws"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-cloud-tools-5.4.0-1005-aws"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-headers-5.4.0-1005-aws"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-image-5.4.0-1005-aws"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-image-5.4.0-1005-aws-dbgsym"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-modules-5.4.0-1005-aws"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-modules-extra-5.4.0-1005-aws"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-tools-5.4.0-1005-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-aws-5.11

Package

Name
linux-aws-5.11
Purl
pkg:deb/ubuntu/linux-aws-5.11?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1009.9~20.04.2
5.11.0-1014.15~20.04.1
5.11.0-1016.17~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.2
5.11.0-1021.22~20.04.2
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-aws-5.13

Package

Name
linux-aws-5.13
Purl
pkg:deb/ubuntu/linux-aws-5.13?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1008.9~20.04.2
5.13.0-1011.12~20.04.1
5.13.0-1012.13~20.04.1
5.13.0-1014.15~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1019.21~20.04.1
5.13.0-1021.23~20.04.2
5.13.0-1022.24~20.04.1
5.13.0-1023.25~20.04.1
5.13.0-1025.27~20.04.1
5.13.0-1028.31~20.04.1
5.13.0-1029.32~20.04.1
5.13.0-1031.35~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-aws-5.15

Package

Name
linux-aws-5.15
Purl
pkg:deb/ubuntu/linux-aws-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1014.18~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1014"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-aws-5.15-headers-5.15.0-1014"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-aws-5.15-tools-5.15.0-1014"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1014-aws"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-1014-aws"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-headers-5.15.0-1014-aws"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1014-aws"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1014-aws-dbgsym"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-modules-5.15.0-1014-aws"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1014-aws"
        },
        {
            "binary_version": "5.15.0-1014.18~20.04.1",
            "binary_name": "linux-tools-5.15.0-1014-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-aws-5.8

Package

Name
linux-aws-5.8
Purl
pkg:deb/ubuntu/linux-aws-5.8?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1035.37~20.04.1
5.8.0-1038.40~20.04.1
5.8.0-1041.43~20.04.1
5.8.0-1042.44~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1006.6

Affected versions

5.*

5.3.0-1003.3
5.3.0-1008.9
5.3.0-1009.10

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-azure-cloud-tools-5.4.0-1006"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-azure-headers-5.4.0-1006"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-azure-tools-5.4.0-1006"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-buildinfo-5.4.0-1006-azure"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-cloud-tools-5.4.0-1006-azure"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-headers-5.4.0-1006-azure"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-image-unsigned-5.4.0-1006-azure"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-image-unsigned-5.4.0-1006-azure-dbgsym"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-modules-5.4.0-1006-azure"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-modules-extra-5.4.0-1006-azure"
        },
        {
            "binary_version": "5.4.0-1006.6",
            "binary_name": "linux-tools-5.4.0-1006-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-azure-5.11

Package

Name
linux-azure-5.11
Purl
pkg:deb/ubuntu/linux-azure-5.11?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1007.7~20.04.2
5.11.0-1012.13~20.04.1
5.11.0-1013.14~20.04.1
5.11.0-1015.16~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-azure-5.13

Package

Name
linux-azure-5.13
Purl
pkg:deb/ubuntu/linux-azure-5.13?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1009.10~20.04.2
5.13.0-1012.14~20.04.1
5.13.0-1013.15~20.04.1
5.13.0-1014.16~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1021.24~20.04.1
5.13.0-1022.26~20.04.1
5.13.0-1023.27~20.04.1
5.13.0-1025.29~20.04.1
5.13.0-1028.33~20.04.1
5.13.0-1029.34~20.04.1
5.13.0-1031.37~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-azure-5.15

Package

Name
linux-azure-5.15
Purl
pkg:deb/ubuntu/linux-azure-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1007.8~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1007"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-azure-5.15-headers-5.15.0-1007"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-azure-5.15-tools-5.15.0-1007"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1007-azure"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-1007-azure"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-headers-5.15.0-1007-azure"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1007-azure"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1007-azure-dbgsym"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-modules-5.15.0-1007-azure"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1007-azure"
        },
        {
            "binary_version": "5.15.0-1007.8~20.04.1",
            "binary_name": "linux-tools-5.15.0-1007-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-azure-5.8

Package

Name
linux-azure-5.8
Purl
pkg:deb/ubuntu/linux-azure-5.8?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1033.35~20.04.1
5.8.0-1036.38~20.04.1
5.8.0-1039.42~20.04.1
5.8.0-1040.43~20.04.1
5.8.0-1041.44~20.04.1
5.8.0-1042.45~20.04.1
5.8.0-1043.46~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-azure-fde

Package

Name
linux-azure-fde
Purl
pkg:deb/ubuntu/linux-azure-fde?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1063.66+cvm2.2
5.4.0-1063.66+cvm3.2
5.4.0-1064.67+cvm1.1
5.4.0-1065.68+cvm2.1
5.4.0-1067.70+cvm1.1
5.4.0-1068.71+cvm1.1
5.4.0-1069.72+cvm1.1
5.4.0-1070.73+cvm1.1
5.4.0-1072.75+cvm1.1
5.4.0-1073.76+cvm1.1
5.4.0-1074.77+cvm1.1
5.4.0-1076.79+cvm1.1
5.4.0-1078.81+cvm1.1
5.4.0-1080.83+cvm1.1
5.4.0-1083.87+cvm1.1
5.4.0-1085.90+cvm1.1
5.4.0-1085.90+cvm2.1
5.4.0-1086.91+cvm1.1
5.4.0-1089.94+cvm1.2
5.4.0-1090.95+cvm1.1
5.4.0-1091.96+cvm1.1
5.4.0-1092.97+cvm1.1
5.4.0-1095.101+cvm1.1
5.4.0-1098.104+cvm1.1
5.4.0-1100.106+cvm1.1
5.4.0-1103.109+cvm1.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-azure-fde-5.15

Package

Name
linux-azure-fde-5.15
Purl
pkg:deb/ubuntu/linux-azure-fde-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1019.24~20.04.1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1019.24~20.04.1.1",
            "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde"
        },
        {
            "binary_version": "5.15.0-1019.24~20.04.1.1",
            "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde-dbgsym"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-bluefield

Package

Name
linux-bluefield
Purl
pkg:deb/ubuntu/linux-bluefield?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1007.10

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1007.10",
            "binary_name": "linux-bluefield-headers-5.4.0-1007"
        },
        {
            "binary_version": "5.4.0-1007.10",
            "binary_name": "linux-bluefield-tools-5.4.0-1007"
        },
        {
            "binary_version": "5.4.0-1007.10",
            "binary_name": "linux-buildinfo-5.4.0-1007-bluefield"
        },
        {
            "binary_version": "5.4.0-1007.10",
            "binary_name": "linux-headers-5.4.0-1007-bluefield"
        },
        {
            "binary_version": "5.4.0-1007.10",
            "binary_name": "linux-image-unsigned-5.4.0-1007-bluefield"
        },
        {
            "binary_version": "5.4.0-1007.10",
            "binary_name": "linux-modules-5.4.0-1007-bluefield"
        },
        {
            "binary_version": "5.4.0-1007.10",
            "binary_name": "linux-tools-5.4.0-1007-bluefield"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1005.5

Affected versions

5.*

5.3.0-1004.4
5.3.0-1009.10
5.3.0-1011.12

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-buildinfo-5.4.0-1005-gcp"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-gcp-headers-5.4.0-1005"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-gcp-tools-5.4.0-1005"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-headers-5.4.0-1005-gcp"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-image-unsigned-5.4.0-1005-gcp"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-image-unsigned-5.4.0-1005-gcp-dbgsym"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-modules-5.4.0-1005-gcp"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-modules-extra-5.4.0-1005-gcp"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-tools-5.4.0-1005-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gcp-5.11

Package

Name
linux-gcp-5.11
Purl
pkg:deb/ubuntu/linux-gcp-5.11?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1009.10~20.04.1
5.11.0-1014.16~20.04.1
5.11.0-1017.19~20.04.1
5.11.0-1018.20~20.04.2
5.11.0-1020.22~20.04.1
5.11.0-1021.23~20.04.1
5.11.0-1022.24~20.04.1
5.11.0-1023.25~20.04.1
5.11.0-1024.26~20.04.1
5.11.0-1026.29~20.04.1
5.11.0-1028.32~20.04.1
5.11.0-1029.33~20.04.3

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gcp-5.13

Package

Name
linux-gcp-5.13
Purl
pkg:deb/ubuntu/linux-gcp-5.13?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1008.9~20.04.3
5.13.0-1012.15~20.04.1
5.13.0-1013.16~20.04.1
5.13.0-1015.18~20.04.1
5.13.0-1019.23~20.04.1
5.13.0-1021.25~20.04.1
5.13.0-1023.28~20.04.1
5.13.0-1024.29~20.04.1
5.13.0-1025.30~20.04.1
5.13.0-1027.32~20.04.1
5.13.0-1030.36~20.04.1
5.13.0-1031.37~20.04.1
5.13.0-1033.40~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gcp-5.15

Package

Name
linux-gcp-5.15
Purl
pkg:deb/ubuntu/linux-gcp-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1006.9~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1006-gcp"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-gcp-5.15-headers-5.15.0-1006"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-gcp-5.15-tools-5.15.0-1006"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-headers-5.15.0-1006-gcp"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1006-gcp"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1006-gcp-dbgsym"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-modules-5.15.0-1006-gcp"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1006-gcp"
        },
        {
            "binary_version": "5.15.0-1006.9~20.04.1",
            "binary_name": "linux-tools-5.15.0-1006-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gcp-5.8

Package

Name
linux-gcp-5.8
Purl
pkg:deb/ubuntu/linux-gcp-5.8?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1032.34~20.04.1
5.8.0-1035.37~20.04.1
5.8.0-1038.40~20.04.1
5.8.0-1039.41

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-1033.35
5.4.0-1035.37
5.4.0-1036.38
5.4.0-1037.39
5.4.0-1039.41
5.4.0-1041.43
5.4.0-1042.44
5.4.0-1043.45
5.4.0-1044.46
5.4.0-1046.48
5.4.0-1049.52
5.4.0-1051.54
5.4.0-1052.55
5.4.0-1053.56
5.4.0-1054.57
5.4.0-1055.58
5.4.0-1056.59
5.4.0-1057.60
5.4.0-1059.62
5.4.0-1061.64
5.4.0-1062.65
5.4.0-1063.66
5.4.0-1065.68
5.4.0-1066.69
5.4.0-1067.70
5.4.0-1068.71
5.4.0-1071.76
5.4.0-1072.77
5.4.0-1074.79
5.4.0-1076.82
5.4.0-1078.84
5.4.0-1080.86
5.4.0-1081.87
5.4.0-1083.89
5.4.0-1084.90
5.4.0-1086.93
5.4.0-1087.94
5.4.0-1090.97
5.4.0-1091.98
5.4.0-1094.101
5.4.0-1095.102
5.4.0-1096.103
5.4.0-1097.104
5.4.0-1098.105
5.4.0-1099.106
5.4.0-1100.107
5.4.0-1101.108
5.4.0-1102.109
5.4.0-1103.110
5.4.0-1104.111
5.4.0-1105.112

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gke-5.15

Package

Name
linux-gke-5.15
Purl
pkg:deb/ubuntu/linux-gke-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.15.0-1011.14~20.04.1
5.15.0-1014.17~20.04.1
5.15.0-1015.18~20.04.1
5.15.0-1016.19~20.04.1
5.15.0-1019.23~20.04.1
5.15.0-1020.25~20.04.1
5.15.0-1023.28~20.04.2
5.15.0-1027.32~20.04.1
5.15.0-1028.33~20.04.1
5.15.0-1029.34~20.04.1
5.15.0-1031.36~20.04.1
5.15.0-1032.37~20.04.1
5.15.0-1033.38~20.04.1
5.15.0-1034.39~20.04.1
5.15.0-1036.41~20.04.1
5.15.0-1037.42~20.04.1
5.15.0-1038.43~20.04.1
5.15.0-1039.44~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gkeop

Package

Name
linux-gkeop
Purl
pkg:deb/ubuntu/linux-gkeop?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1008.9

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-buildinfo-5.4.0-1008-gkeop"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-cloud-tools-5.4.0-1008-gkeop"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-gkeop-cloud-tools-5.4.0-1008"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-gkeop-headers-5.4.0-1008"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-gkeop-source-5.4.0"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-gkeop-tools-5.4.0-1008"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-headers-5.4.0-1008-gkeop"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-image-unsigned-5.4.0-1008-gkeop"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-image-unsigned-5.4.0-1008-gkeop-dbgsym"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-modules-5.4.0-1008-gkeop"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-modules-extra-5.4.0-1008-gkeop"
        },
        {
            "binary_version": "5.4.0-1008.9",
            "binary_name": "linux-tools-5.4.0-1008-gkeop"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-gkeop-5.15

Package

Name
linux-gkeop-5.15
Purl
pkg:deb/ubuntu/linux-gkeop-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1003.5~20.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-buildinfo-5.15.0-1003-gkeop"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-cloud-tools-5.15.0-1003-gkeop"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1003"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-gkeop-5.15-headers-5.15.0-1003"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-gkeop-5.15-tools-5.15.0-1003"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-headers-5.15.0-1003-gkeop"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-image-unsigned-5.15.0-1003-gkeop"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-image-unsigned-5.15.0-1003-gkeop-dbgsym"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-modules-5.15.0-1003-gkeop"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-modules-extra-5.15.0-1003-gkeop"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.2",
            "binary_name": "linux-tools-5.15.0-1003-gkeop"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-hwe-5.11

Package

Name
linux-hwe-5.11
Purl
pkg:deb/ubuntu/linux-hwe-5.11?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-22.23~20.04.1
5.11.0-25.27~20.04.1
5.11.0-27.29~20.04.1
5.11.0-34.36~20.04.1
5.11.0-36.40~20.04.1
5.11.0-37.41~20.04.2
5.11.0-38.42~20.04.1
5.11.0-40.44~20.04.2
5.11.0-41.45~20.04.1
5.11.0-43.47~20.04.2
5.11.0-44.48~20.04.2
5.11.0-46.51~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-hwe-5.13

Package

Name
linux-hwe-5.13
Purl
pkg:deb/ubuntu/linux-hwe-5.13?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-21.21~20.04.1
5.13.0-22.22~20.04.1
5.13.0-23.23~20.04.2
5.13.0-25.26~20.04.1
5.13.0-27.29~20.04.1
5.13.0-28.31~20.04.1
5.13.0-30.33~20.04.1
5.13.0-35.40~20.04.1
5.13.0-37.42~20.04.1
5.13.0-39.44~20.04.1
5.13.0-40.45~20.04.1
5.13.0-41.46~20.04.1
5.13.0-44.49~20.04.1
5.13.0-48.54~20.04.1
5.13.0-51.58~20.04.1
5.13.0-52.59~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-hwe-5.15

Package

Name
linux-hwe-5.15
Purl
pkg:deb/ubuntu/linux-hwe-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-33.34~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-33-generic-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-33-generic-lpae"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-headers-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-headers-5.15.0-33-generic-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-headers-5.15.0-33-generic-lpae"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-33"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-hwe-5.15-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-hwe-5.15-headers-5.15.0-33"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-hwe-5.15-source-5.15.0"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-hwe-5.15-tools-5.15.0-33"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-hwe-5.15-tools-common"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-hwe-5.15-tools-host"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-5.15.0-33-generic-dbgsym"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-5.15.0-33-generic-lpae"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-5.15.0-33-generic-lpae-dbgsym"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-generic-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-generic-64k-dbgsym"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-generic-dbgsym"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-modules-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-modules-5.15.0-33-generic-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-modules-5.15.0-33-generic-lpae"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-tools-5.15.0-33-generic"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-tools-5.15.0-33-generic-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-tools-5.15.0-33-generic-lpae"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-hwe-5.8

Package

Name
linux-hwe-5.8
Purl
pkg:deb/ubuntu/linux-hwe-5.8?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-23.24~20.04.1
5.8.0-25.26~20.04.1
5.8.0-28.30~20.04.1
5.8.0-29.31~20.04.1
5.8.0-31.33~20.04.1
5.8.0-33.36~20.04.1
5.8.0-34.37~20.04.2
5.8.0-36.40~20.04.1
5.8.0-38.43~20.04.1
5.8.0-40.45~20.04.1
5.8.0-41.46~20.04.1
5.8.0-43.49~20.04.1
5.8.0-44.50~20.04.1
5.8.0-45.51~20.04.1
5.8.0-48.54~20.04.1
5.8.0-49.55~20.04.1
5.8.0-50.56~20.04.1
5.8.0-53.60~20.04.1
5.8.0-55.62~20.04.1
5.8.0-59.66~20.04.1
5.8.0-63.71~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-ibm

Package

Name
linux-ibm
Purl
pkg:deb/ubuntu/linux-ibm?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1003.4

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-buildinfo-5.4.0-1003-ibm"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-headers-5.4.0-1003-ibm"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-ibm-cloud-tools-common"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-ibm-headers-5.4.0-1003"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-ibm-source-5.4.0"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-ibm-tools-5.4.0-1003"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-ibm-tools-common"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-image-unsigned-5.4.0-1003-ibm"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-image-unsigned-5.4.0-1003-ibm-dbgsym"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-modules-5.4.0-1003-ibm"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-modules-extra-5.4.0-1003-ibm"
        },
        {
            "binary_version": "5.4.0-1003.4",
            "binary_name": "linux-tools-5.4.0-1003-ibm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-ibm-5.15

Package

Name
linux-ibm-5.15
Purl
pkg:deb/ubuntu/linux-ibm-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1033.36~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1033-ibm"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-headers-5.15.0-1033-ibm"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-ibm-5.15-headers-5.15.0-1033"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-ibm-5.15-source-5.15.0"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-ibm-5.15-tools-5.15.0-1033"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1033-ibm"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1033-ibm-dbgsym"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-modules-5.15.0-1033-ibm"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1033-ibm"
        },
        {
            "binary_version": "5.15.0-1033.36~20.04.1",
            "binary_name": "linux-tools-5.15.0-1033-ibm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-intel-5.13

Package

Name
linux-intel-5.13
Purl
pkg:deb/ubuntu/linux-intel-5.13?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1007.7
5.13.0-1008.8
5.13.0-1009.9
5.13.0-1010.10
5.13.0-1011.11
5.13.0-1014.15
5.13.0-1017.19

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-intel-iotg-5.15

Package

Name
linux-intel-iotg-5.15
Purl
pkg:deb/ubuntu/linux-intel-iotg-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1003.5~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1003-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-1003-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-headers-5.15.0-1003-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1003-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1003-intel-iotg-dbgsym"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1003"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-intel-iotg-5.15-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1003"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1003"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-intel-iotg-5.15-tools-common"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-intel-iotg-5.15-tools-host"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-modules-5.15.0-1003-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1003-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1003.5~20.04.1",
            "binary_name": "linux-tools-5.15.0-1003-intel-iotg"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-iot

Package

Name
linux-iot
Purl
pkg:deb/ubuntu/linux-iot?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1001.3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-buildinfo-5.4.0-1001-iot"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-headers-5.4.0-1001-iot"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-image-unsigned-5.4.0-1001-iot"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-image-unsigned-5.4.0-1001-iot-dbgsym"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-iot-headers-5.4.0-1001"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-iot-tools-5.4.0-1001"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-iot-tools-common"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-modules-5.4.0-1001-iot"
        },
        {
            "binary_version": "5.4.0-1001.3",
            "binary_name": "linux-tools-5.4.0-1001-iot"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1004.4

Affected versions

5.*

5.3.0-1003.3
5.3.0-1008.9
5.3.0-1009.10

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-buildinfo-5.4.0-1004-kvm"
        },
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-headers-5.4.0-1004-kvm"
        },
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-image-5.4.0-1004-kvm"
        },
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-image-5.4.0-1004-kvm-dbgsym"
        },
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-kvm-headers-5.4.0-1004"
        },
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-kvm-tools-5.4.0-1004"
        },
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-modules-5.4.0-1004-kvm"
        },
        {
            "binary_version": "5.4.0-1004.4",
            "binary_name": "linux-tools-5.4.0-1004-kvm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-lowlatency-hwe-5.15

Package

Name
linux-lowlatency-hwe-5.15
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-33.34~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-33-lowlatency"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-33-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-33-lowlatency"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-headers-5.15.0-33-lowlatency"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-headers-5.15.0-33-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-lowlatency"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-33-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-33"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-33"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-33"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-tools-common"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-tools-host"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-modules-5.15.0-33-lowlatency"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-modules-5.15.0-33-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-tools-5.15.0-33-lowlatency"
        },
        {
            "binary_version": "5.15.0-33.34~20.04.1",
            "binary_name": "linux-tools-5.15.0-33-lowlatency-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oem-5.10

Package

Name
linux-oem-5.10
Purl
pkg:deb/ubuntu/linux-oem-5.10?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.10.0-1008.9
5.10.0-1011.12
5.10.0-1013.14
5.10.0-1014.15
5.10.0-1016.17
5.10.0-1017.18
5.10.0-1019.20
5.10.0-1021.22
5.10.0-1022.23
5.10.0-1023.24
5.10.0-1025.26
5.10.0-1026.27
5.10.0-1029.30
5.10.0-1032.33
5.10.0-1033.34
5.10.0-1034.35
5.10.0-1038.40
5.10.0-1044.46
5.10.0-1045.47
5.10.0-1049.51
5.10.0-1050.52
5.10.0-1051.53
5.10.0-1052.54
5.10.0-1053.55
5.10.0-1055.58
5.10.0-1057.61

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oem-5.13

Package

Name
linux-oem-5.13
Purl
pkg:deb/ubuntu/linux-oem-5.13?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1009.10
5.13.0-1010.11
5.13.0-1012.16
5.13.0-1014.18
5.13.0-1017.21
5.13.0-1019.23
5.13.0-1020.24
5.13.0-1021.25
5.13.0-1022.26
5.13.0-1026.32
5.13.0-1028.35
5.13.0-1029.36

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oem-5.14

Package

Name
linux-oem-5.14
Purl
pkg:deb/ubuntu/linux-oem-5.14?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.14.0-1004.4
5.14.0-1005.5
5.14.0-1007.7
5.14.0-1008.8
5.14.0-1010.10
5.14.0-1011.11
5.14.0-1013.13
5.14.0-1018.19
5.14.0-1020.22
5.14.0-1022.24
5.14.0-1024.26
5.14.0-1027.30
5.14.0-1029.32
5.14.0-1031.34
5.14.0-1032.35
5.14.0-1033.36
5.14.0-1034.37
5.14.0-1036.40
5.14.0-1038.42
5.14.0-1042.47
5.14.0-1044.49
5.14.0-1045.51
5.14.0-1046.53
5.14.0-1047.54
5.14.0-1048.55
5.14.0-1049.56
5.14.0-1050.57
5.14.0-1051.58
5.14.0-1052.59
5.14.0-1054.61
5.14.0-1055.62
5.14.0-1056.63
5.14.0-1057.64
5.14.0-1058.66
5.14.0-1059.67

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oem-5.6

Package

Name
linux-oem-5.6
Purl
pkg:deb/ubuntu/linux-oem-5.6?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.6.0-1007.7
5.6.0-1008.8
5.6.0-1010.10
5.6.0-1011.11
5.6.0-1013.13
5.6.0-1017.17
5.6.0-1018.18
5.6.0-1020.20
5.6.0-1021.21
5.6.0-1023.23
5.6.0-1026.26
5.6.0-1027.27
5.6.0-1028.28
5.6.0-1031.32
5.6.0-1032.33
5.6.0-1033.35
5.6.0-1034.36
5.6.0-1035.37
5.6.0-1036.39
5.6.0-1039.43
5.6.0-1042.46
5.6.0-1047.51
5.6.0-1048.52
5.6.0-1050.54
5.6.0-1052.56
5.6.0-1053.57
5.6.0-1054.58
5.6.0-1055.59
5.6.0-1056.60

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1005.5

Affected versions

5.*

5.3.0-1002.2
5.3.0-1007.8
5.3.0-1008.9

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-buildinfo-5.4.0-1005-oracle"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-headers-5.4.0-1005-oracle"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-image-unsigned-5.4.0-1005-oracle"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-image-unsigned-5.4.0-1005-oracle-dbgsym"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-modules-5.4.0-1005-oracle"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-modules-extra-5.4.0-1005-oracle"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-oracle-headers-5.4.0-1005"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-oracle-tools-5.4.0-1005"
        },
        {
            "binary_version": "5.4.0-1005.5",
            "binary_name": "linux-tools-5.4.0-1005-oracle"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oracle-5.11

Package

Name
linux-oracle-5.11
Purl
pkg:deb/ubuntu/linux-oracle-5.11?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1008.8~20.04.1
5.11.0-1013.14~20.04.1
5.11.0-1016.17~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1019.20~20.04.1
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1025.27~20.04.1
5.11.0-1027.30~20.04.1
5.11.0-1028.31~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oracle-5.13

Package

Name
linux-oracle-5.13
Purl
pkg:deb/ubuntu/linux-oracle-5.13?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1011.13~20.04.2
5.13.0-1015.19~20.04.1
5.13.0-1016.20~20.04.1
5.13.0-1018.22~20.04.1
5.13.0-1021.26~20.04.1
5.13.0-1025.30~20.04.1
5.13.0-1027.32~20.04.1
5.13.0-1028.33~20.04.1
5.13.0-1030.35~20.04.1
5.13.0-1033.39~20.04.1
5.13.0-1034.40~20.04.1
5.13.0-1036.43~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oracle-5.15

Package

Name
linux-oracle-5.15
Purl
pkg:deb/ubuntu/linux-oracle-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1007.9~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1007-oracle"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-headers-5.15.0-1007-oracle"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1007-oracle"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1007-oracle-dbgsym"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-modules-5.15.0-1007-oracle"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1007-oracle"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-oracle-5.15-headers-5.15.0-1007"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-oracle-5.15-tools-5.15.0-1007"
        },
        {
            "binary_version": "5.15.0-1007.9~20.04.1",
            "binary_name": "linux-tools-5.15.0-1007-oracle"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-oracle-5.8

Package

Name
linux-oracle-5.8
Purl
pkg:deb/ubuntu/linux-oracle-5.8?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-1031.32~20.04.2
5.8.0-1033.34~20.04.1
5.8.0-1034.35~20.04.2
5.8.0-1037.38~20.04.1
5.8.0-1038.39~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1007.7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-buildinfo-5.4.0-1007-raspi"
        },
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-headers-5.4.0-1007-raspi"
        },
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-image-5.4.0-1007-raspi"
        },
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-image-5.4.0-1007-raspi-dbgsym"
        },
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-modules-5.4.0-1007-raspi"
        },
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-raspi-headers-5.4.0-1007"
        },
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-raspi-tools-5.4.0-1007"
        },
        {
            "binary_version": "5.4.0-1007.7",
            "binary_name": "linux-tools-5.4.0-1007-raspi"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-raspi2

Package

Name
linux-raspi2
Purl
pkg:deb/ubuntu/linux-raspi2?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-1007.8
5.3.0-1014.16
5.3.0-1015.17
5.3.0-1017.19
5.4.0-1004.4
5.4.0-1006.6

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-riscv

Package

Name
linux-riscv
Purl
pkg:deb/ubuntu/linux-riscv?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4.0-24.28
5.4.0-26.30
5.4.0-27.31
5.4.0-28.32
5.4.0-30.34
5.4.0-31.35
5.4.0-33.37
5.4.0-34.38
5.4.0-36.41
5.4.0-37.42
5.4.0-39.44
5.4.0-40.45

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-riscv-5.11

Package

Name
linux-riscv-5.11
Purl
pkg:deb/ubuntu/linux-riscv-5.11?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.11.0-1015.16~20.04.1
5.11.0-1017.18~20.04.1
5.11.0-1018.19~20.04.2
5.11.0-1020.21~20.04.1
5.11.0-1021.22~20.04.1
5.11.0-1022.23~20.04.1
5.11.0-1023.24~20.04.1
5.11.0-1024.25~20.04.1
5.11.0-1026.28~20.04.1
5.11.0-1028.31~20.04.1
5.11.0-1029.32~20.04.1
5.11.0-1030.34
5.11.0-1031.35

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-riscv-5.15

Package

Name
linux-riscv-5.15
Purl
pkg:deb/ubuntu/linux-riscv-5.15?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1015.17~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1015-generic"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-headers-5.15.0-1015-generic"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-image-5.15.0-1015-generic"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-image-5.15.0-1015-generic-dbgsym"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-modules-5.15.0-1015-generic"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1015-generic"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-riscv-5.15-headers-5.15.0-1015"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-riscv-5.15-tools-5.15.0-1015"
        },
        {
            "binary_version": "5.15.0-1015.17~20.04.1",
            "binary_name": "linux-tools-5.15.0-1015-generic"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-riscv-5.8

Package

Name
linux-riscv-5.8
Purl
pkg:deb/ubuntu/linux-riscv-5.8?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.8.0-14.16~20.04.1
5.8.0-14.16~20.04.3
5.8.0-16.18~20.04.1
5.8.0-17.19~20.04.1
5.8.0-18.20~20.04.1
5.8.0-20.22~20.04.1
5.8.0-22.24~20.04.1
5.8.0-25.27~20.04.1
5.8.0-26.28~20.04.1
5.8.0-29.31~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:20.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1020.24

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-buildinfo-5.4.0-1020-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-headers-5.4.0-1020-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-image-5.4.0-1020-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-image-5.4.0-1020-xilinx-zynqmp-dbgsym"
        },
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-modules-5.4.0-1020-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-tools-5.4.0-1020-xilinx-zynqmp"
        },
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1020"
        },
        {
            "binary_version": "5.4.0-1020.24",
            "binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1020"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:20.04:LTS / linux-aws-fips

Package

Name
linux-aws-fips
Purl
pkg:deb/ubuntu/linux-aws-fips?arch=src?distro=fips-updates/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1021.21+fips2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-aws-fips-headers-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-aws-fips-tools-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-buildinfo-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-headers-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-modules-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-modules-extra-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-tools-5.4.0-1021-aws-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:20.04:LTS / linux-azure-fips

Package

Name
linux-azure-fips
Purl
pkg:deb/ubuntu/linux-azure-fips?arch=src?distro=fips-updates/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1022.22+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-azure-fips-headers-5.4.0-1022"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-azure-fips-tools-5.4.0-1022"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-buildinfo-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-headers-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-modules-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-modules-extra-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-tools-5.4.0-1022-azure-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:20.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips-updates/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1026.30

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-buildinfo-5.4.0-1026-fips"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-fips-headers-5.4.0-1026"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-fips-tools-5.4.0-1026"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-fips-tools-host"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-headers-5.4.0-1026-fips"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-image-unsigned-5.4.0-1026-fips"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-image-unsigned-5.4.0-1026-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1026-fips"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-modules-5.4.0-1026-fips"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-modules-extra-5.4.0-1026-fips"
        },
        {
            "binary_version": "5.4.0-1026.30",
            "binary_name": "linux-tools-5.4.0-1026-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:20.04:LTS / linux-gcp-fips

Package

Name
linux-gcp-fips
Purl
pkg:deb/ubuntu/linux-gcp-fips?arch=src?distro=fips-updates/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1021.21+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-gcp-fips-headers-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-gcp-fips-tools-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-headers-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-modules-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-tools-5.4.0-1021-gcp-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:20.04:LTS / linux-aws-fips

Package

Name
linux-aws-fips
Purl
pkg:deb/ubuntu/linux-aws-fips?arch=src?distro=fips/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1021.21+fips2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-aws-fips-headers-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-aws-fips-tools-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-buildinfo-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-headers-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-modules-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-modules-extra-5.4.0-1021-aws-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips2",
            "binary_name": "linux-tools-5.4.0-1021-aws-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:20.04:LTS / linux-azure-fips

Package

Name
linux-azure-fips
Purl
pkg:deb/ubuntu/linux-azure-fips?arch=src?distro=fips/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1022.22+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-azure-fips-headers-5.4.0-1022"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-azure-fips-tools-5.4.0-1022"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-buildinfo-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-headers-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-modules-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-modules-extra-5.4.0-1022-azure-fips"
        },
        {
            "binary_version": "5.4.0-1022.22+fips1",
            "binary_name": "linux-tools-5.4.0-1022-azure-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:20.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1007.8

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-buildinfo-5.4.0-1007-fips"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-fips-headers-5.4.0-1007"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-fips-tools-5.4.0-1007"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-fips-tools-host"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-headers-5.4.0-1007-fips"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-image-unsigned-5.4.0-1007-fips"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-image-unsigned-5.4.0-1007-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1007-fips"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-modules-5.4.0-1007-fips"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-modules-extra-5.4.0-1007-fips"
        },
        {
            "binary_version": "5.4.0-1007.8",
            "binary_name": "linux-tools-5.4.0-1007-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS:20.04:LTS / linux-gcp-fips

Package

Name
linux-gcp-fips
Purl
pkg:deb/ubuntu/linux-gcp-fips?arch=src?distro=fips/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1021.21+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-gcp-fips-headers-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-gcp-fips-tools-5.4.0-1021"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-headers-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips-dbgsym"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-modules-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips"
        },
        {
            "binary_version": "5.4.0-1021.21+fips1",
            "binary_name": "linux-tools-5.4.0-1021-gcp-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-19.19

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-buildinfo-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-buildinfo-5.13.0-19-generic-64k"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-buildinfo-5.13.0-19-generic-lpae"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-buildinfo-5.13.0-19-lowlatency"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-cloud-tools-5.13.0-19"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-cloud-tools-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-cloud-tools-5.13.0-19-lowlatency"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-headers-5.13.0-19"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-headers-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-headers-5.13.0-19-generic-64k"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-headers-5.13.0-19-generic-lpae"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-headers-5.13.0-19-lowlatency"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-5.13.0-19-generic-dbgsym"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-5.13.0-19-generic-lpae"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-5.13.0-19-generic-lpae-dbgsym"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-unsigned-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-unsigned-5.13.0-19-generic-64k"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-unsigned-5.13.0-19-generic-64k-dbgsym"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-unsigned-5.13.0-19-generic-dbgsym"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-unsigned-5.13.0-19-lowlatency"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-image-unsigned-5.13.0-19-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-modules-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-modules-5.13.0-19-generic-64k"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-modules-5.13.0-19-generic-lpae"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-modules-5.13.0-19-lowlatency"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-modules-extra-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-source-5.13.0"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-tools-5.13.0-19"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-tools-5.13.0-19-generic"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-tools-5.13.0-19-generic-64k"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-tools-5.13.0-19-generic-lpae"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-tools-5.13.0-19-lowlatency"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "5.13.0-19.19",
            "binary_name": "linux-tools-host"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-allwinner-5.19

Package

Name
linux-allwinner-5.19
Purl
pkg:deb/ubuntu/linux-allwinner-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1007.7~22.04.1
5.19.0-1009.9~22.04.1
5.19.0-1010.10~22.04.1
5.19.0-1011.11~22.04.1
5.19.0-1012.12~22.04.1
5.19.0-1013.13~22.04.1
5.19.0-1014.14~22.04.1
5.19.0-1015.15~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1005.6

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-aws-cloud-tools-5.13.0-1005"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-aws-headers-5.13.0-1005"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-aws-tools-5.13.0-1005"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-buildinfo-5.13.0-1005-aws"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-cloud-tools-5.13.0-1005-aws"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-headers-5.13.0-1005-aws"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-image-5.13.0-1005-aws"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-image-5.13.0-1005-aws-dbgsym"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-modules-5.13.0-1005-aws"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-modules-extra-5.13.0-1005-aws"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-tools-5.13.0-1005-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-aws-5.19

Package

Name
linux-aws-5.19
Purl
pkg:deb/ubuntu/linux-aws-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1019.20~22.04.1
5.19.0-1020.21~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1024.25~22.04.1
5.19.0-1025.26~22.04.1
5.19.0-1026.27~22.04.1
5.19.0-1027.28~22.04.1
5.19.0-1028.29~22.04.1
5.19.0-1029.30~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-aws-6.2

Package

Name
linux-aws-6.2
Purl
pkg:deb/ubuntu/linux-aws-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1010.10~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-aws-6.5

Package

Name
linux-aws-6.5
Purl
pkg:deb/ubuntu/linux-aws-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1008.8~22.04.1
6.5.0-1010.10~22.04.1
6.5.0-1011.11~22.04.1
6.5.0-1012.12~22.04.1
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.2
6.5.0-1018.18~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1021.21~22.04.1
6.5.0-1022.22~22.04.1
6.5.0-1023.23~22.04.1
6.5.0-1024.24~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-aws-6.8

Package

Name
linux-aws-6.8
Purl
pkg:deb/ubuntu/linux-aws-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1015.16~22.04.1

Affected versions

6.*

6.8.0-1009.9~22.04.2
6.8.0-1010.10~22.04.2
6.8.0-1011.12~22.04.1
6.8.0-1013.14~22.04.1
6.8.0-1014.15~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1015"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-aws-6.8-headers-6.8.0-1015"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-aws-6.8-tools-6.8.0-1015"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-cloud-tools-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-headers-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1015-aws-dbgsym"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-modules-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-modules-extra-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16~22.04.1",
            "binary_name": "linux-tools-6.8.0-1015-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1006.7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-azure-cloud-tools-5.13.0-1006"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-azure-headers-5.13.0-1006"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-azure-tools-5.13.0-1006"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-buildinfo-5.13.0-1006-azure"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-cloud-tools-5.13.0-1006-azure"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-headers-5.13.0-1006-azure"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-image-unsigned-5.13.0-1006-azure"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-image-unsigned-5.13.0-1006-azure-dbgsym"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-modules-5.13.0-1006-azure"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-modules-extra-5.13.0-1006-azure"
        },
        {
            "binary_version": "5.13.0-1006.7",
            "binary_name": "linux-tools-5.13.0-1006-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure-5.19

Package

Name
linux-azure-5.19
Purl
pkg:deb/ubuntu/linux-azure-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1020.21~22.04.1
5.19.0-1021.22~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1025.28~22.04.1
5.19.0-1026.29~22.04.1
5.19.0-1027.30~22.04.2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure-6.2

Package

Name
linux-azure-6.2
Purl
pkg:deb/ubuntu/linux-azure-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1005.5~22.04.1
6.2.0-1006.6~22.04.1
6.2.0-1007.7~22.04.1
6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.3
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1
6.2.0-1019.19~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure-6.5

Package

Name
linux-azure-6.5
Purl
pkg:deb/ubuntu/linux-azure-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1007.7~22.04.1
6.5.0-1009.9~22.04.1
6.5.0-1010.10~22.04.1
6.5.0-1011.11~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.1
6.5.0-1018.19~22.04.2
6.5.0-1019.20~22.04.1
6.5.0-1021.22~22.04.1
6.5.0-1022.23~22.04.1
6.5.0-1023.24~22.04.1
6.5.0-1024.25~22.04.1
6.5.0-1025.26~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure-6.8

Package

Name
linux-azure-6.8
Purl
pkg:deb/ubuntu/linux-azure-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.8.0-1008.8~22.04.1
6.8.0-1009.9~22.04.1
6.8.0-1010.10~22.04.1
6.8.0-1012.14~22.04.1
6.8.0-1013.15~22.04.1
6.8.0-1014.16~22.04.1
6.8.0-1015.17~22.04.2
6.8.0-1017.20~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure-fde

Package

Name
linux-azure-fde
Purl
pkg:deb/ubuntu/linux-azure-fde?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1019.24.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1019.24.1",
            "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde"
        },
        {
            "binary_version": "5.15.0-1019.24.1",
            "binary_name": "linux-image-unsigned-5.15.0-1019-azure-fde-dbgsym"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure-fde-5.19

Package

Name
linux-azure-fde-5.19
Purl
pkg:deb/ubuntu/linux-azure-fde-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1025.28~22.04.1.1
5.19.0-1026.29~22.04.1.1
5.19.0-1027.30~22.04.2.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-azure-fde-6.2

Package

Name
linux-azure-fde-6.2
Purl
pkg:deb/ubuntu/linux-azure-fde-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1008.8~22.04.1.1
6.2.0-1009.9~22.04.3.1
6.2.0-1011.11~22.04.1.1
6.2.0-1012.12~22.04.1.1
6.2.0-1014.14~22.04.1.1
6.2.0-1015.15~22.04.1.1
6.2.0-1016.16~22.04.1.1
6.2.0-1017.17~22.04.1.1
6.2.0-1018.18~22.04.1.1
6.2.0-1019.19~22.04.1.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1005.6

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-buildinfo-5.13.0-1005-gcp"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-gcp-headers-5.13.0-1005"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-gcp-tools-5.13.0-1005"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-headers-5.13.0-1005-gcp"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-image-unsigned-5.13.0-1005-gcp"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-image-unsigned-5.13.0-1005-gcp-dbgsym"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-modules-5.13.0-1005-gcp"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-modules-extra-5.13.0-1005-gcp"
        },
        {
            "binary_version": "5.13.0-1005.6",
            "binary_name": "linux-tools-5.13.0-1005-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-gcp-5.19

Package

Name
linux-gcp-5.19
Purl
pkg:deb/ubuntu/linux-gcp-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1020.22~22.04.2
5.19.0-1021.23~22.04.1
5.19.0-1022.24~22.04.1
5.19.0-1024.26~22.04.1
5.19.0-1025.27~22.04.1
5.19.0-1026.28~22.04.1
5.19.0-1027.29~22.04.1
5.19.0-1030.32~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-gcp-6.2

Package

Name
linux-gcp-6.2
Purl
pkg:deb/ubuntu/linux-gcp-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1009.9~22.04.3
6.2.0-1010.10~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1011.11~22.04.3
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1016.18~22.04.1
6.2.0-1017.19~22.04.1
6.2.0-1018.20~22.04.1
6.2.0-1019.21~22.04.1
6.2.0-1021.23~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-gcp-6.5

Package

Name
linux-gcp-6.5
Purl
pkg:deb/ubuntu/linux-gcp-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1010.10~22.04.3
6.5.0-1011.11~22.04.1
6.5.0-1013.13~22.04.1
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1017.17~22.04.1
6.5.0-1018.18~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1022.24~22.04.1
6.5.0-1023.25~22.04.1
6.5.0-1024.26~22.04.1
6.5.0-1025.27~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-gcp-6.8

Package

Name
linux-gcp-6.8
Purl
pkg:deb/ubuntu/linux-gcp-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1014.16~22.04.1

Affected versions

6.*

6.8.0-1010.11~22.04.1
6.8.0-1011.12~22.04.1
6.8.0-1012.13~22.04.1
6.8.0-1013.14~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-gcp-6.8-headers-6.8.0-1014"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-gcp-6.8-tools-6.8.0-1014"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-headers-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1014-gcp-dbgsym"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-modules-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-modules-extra-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16~22.04.1",
            "binary_name": "linux-tools-6.8.0-1014-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1002.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-buildinfo-5.15.0-1002-gke"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-gke-headers-5.15.0-1002"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-gke-tools-5.15.0-1002"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-headers-5.15.0-1002-gke"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-image-unsigned-5.15.0-1002-gke"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-image-unsigned-5.15.0-1002-gke-dbgsym"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-modules-5.15.0-1002-gke"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-modules-extra-5.15.0-1002-gke"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-tools-5.15.0-1002-gke"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-gkeop

Package

Name
linux-gkeop
Purl
pkg:deb/ubuntu/linux-gkeop?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1001.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-buildinfo-5.15.0-1001-gkeop"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-cloud-tools-5.15.0-1001-gkeop"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-gkeop-cloud-tools-5.15.0-1001"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-gkeop-headers-5.15.0-1001"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-gkeop-tools-5.15.0-1001"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-headers-5.15.0-1001-gkeop"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-image-unsigned-5.15.0-1001-gkeop"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-image-unsigned-5.15.0-1001-gkeop-dbgsym"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-modules-5.15.0-1001-gkeop"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-modules-extra-5.15.0-1001-gkeop"
        },
        {
            "binary_version": "5.15.0-1001.2",
            "binary_name": "linux-tools-5.15.0-1001-gkeop"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-hwe-5.19

Package

Name
linux-hwe-5.19
Purl
pkg:deb/ubuntu/linux-hwe-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-28.29~22.04.1
5.19.0-32.33~22.04.1
5.19.0-35.36~22.04.1
5.19.0-38.39~22.04.1
5.19.0-40.41~22.04.1
5.19.0-41.42~22.04.1
5.19.0-42.43~22.04.1
5.19.0-43.44~22.04.1
5.19.0-45.46~22.04.1
5.19.0-46.47~22.04.1
5.19.0-50.50

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-hwe-6.2

Package

Name
linux-hwe-6.2
Purl
pkg:deb/ubuntu/linux-hwe-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-25.25~22.04.2
6.2.0-26.26~22.04.1
6.2.0-31.31~22.04.1
6.2.0-32.32~22.04.1
6.2.0-33.33~22.04.1
6.2.0-34.34~22.04.1
6.2.0-35.35~22.04.1
6.2.0-36.37~22.04.1
6.2.0-37.38~22.04.1
6.2.0-39.40~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-hwe-6.5

Package

Name
linux-hwe-6.5
Purl
pkg:deb/ubuntu/linux-hwe-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-14.14~22.04.1
6.5.0-15.15~22.04.1
6.5.0-17.17~22.04.1
6.5.0-18.18~22.04.1
6.5.0-21.21~22.04.1
6.5.0-25.25~22.04.1
6.5.0-26.26~22.04.1
6.5.0-27.28~22.04.1
6.5.0-28.29~22.04.1
6.5.0-35.35~22.04.1
6.5.0-41.41~22.04.2
6.5.0-44.44~22.04.1
6.5.0-45.45~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-hwe-6.8

Package

Name
linux-hwe-6.8
Purl
pkg:deb/ubuntu/linux-hwe-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-45.45~22.04.1

Affected versions

6.*

6.8.0-38.38~22.04.1
6.8.0-39.39~22.04.1
6.8.0-40.40~22.04.3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-45-generic-64k"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-cloud-tools-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-headers-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-headers-6.8.0-45-generic-64k"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-45"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.8-headers-6.8.0-45"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-hwe-6.8-tools-6.8.0-45"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-image-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-image-6.8.0-45-generic-dbgsym"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-45-generic-64k"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-45-generic-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-45-generic-dbgsym"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-modules-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-modules-6.8.0-45-generic-64k"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-modules-extra-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-modules-ipu6-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-modules-usbio-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-tools-6.8.0-45-generic"
        },
        {
            "binary_version": "6.8.0-45.45~22.04.1",
            "binary_name": "linux-tools-6.8.0-45-generic-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-ibm

Package

Name
linux-ibm
Purl
pkg:deb/ubuntu/linux-ibm?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1002.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-buildinfo-5.15.0-1002-ibm"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-headers-5.15.0-1002-ibm"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-ibm-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-ibm-headers-5.15.0-1002"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-ibm-source-5.15.0"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-ibm-tools-5.15.0-1002"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-ibm-tools-common"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-image-unsigned-5.15.0-1002-ibm"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-image-unsigned-5.15.0-1002-ibm-dbgsym"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-modules-5.15.0-1002-ibm"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-modules-extra-5.15.0-1002-ibm"
        },
        {
            "binary_version": "5.15.0-1002.2",
            "binary_name": "linux-tools-5.15.0-1002-ibm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-intel-iotg

Package

Name
linux-intel-iotg
Purl
pkg:deb/ubuntu/linux-intel-iotg?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1004.6

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-buildinfo-5.15.0-1004-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-cloud-tools-5.15.0-1004-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-headers-5.15.0-1004-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-image-unsigned-5.15.0-1004-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-image-unsigned-5.15.0-1004-intel-iotg-dbgsym"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1004"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-intel-iotg-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-intel-iotg-headers-5.15.0-1004"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-intel-iotg-tools-5.15.0-1004"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-intel-iotg-tools-common"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-intel-iotg-tools-host"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-modules-5.15.0-1004-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-modules-extra-5.15.0-1004-intel-iotg"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-tools-5.15.0-1004-intel-iotg"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1004.4

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-buildinfo-5.13.0-1004-kvm"
        },
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-headers-5.13.0-1004-kvm"
        },
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-image-unsigned-5.13.0-1004-kvm"
        },
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-image-unsigned-5.13.0-1004-kvm-dbgsym"
        },
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-kvm-headers-5.13.0-1004"
        },
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-kvm-tools-5.13.0-1004"
        },
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-modules-5.13.0-1004-kvm"
        },
        {
            "binary_version": "5.13.0-1004.4",
            "binary_name": "linux-tools-5.13.0-1004-kvm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-22.22

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-buildinfo-5.15.0-22-lowlatency"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-buildinfo-5.15.0-22-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-cloud-tools-5.15.0-22-lowlatency"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-headers-5.15.0-22-lowlatency"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-headers-5.15.0-22-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-image-unsigned-5.15.0-22-lowlatency"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-image-unsigned-5.15.0-22-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-image-unsigned-5.15.0-22-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-image-unsigned-5.15.0-22-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-lowlatency-cloud-tools-5.15.0-22"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-lowlatency-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-lowlatency-headers-5.15.0-22"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-lowlatency-tools-5.15.0-22"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-lowlatency-tools-common"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-lowlatency-tools-host"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-modules-5.15.0-22-lowlatency"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-modules-5.15.0-22-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-tools-5.15.0-22-lowlatency"
        },
        {
            "binary_version": "5.15.0-22.22",
            "binary_name": "linux-tools-5.15.0-22-lowlatency-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-5.19

Package

Name
linux-lowlatency-hwe-5.19
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1017.18~22.04.1
5.19.0-1018.19~22.04.1
5.19.0-1021.22~22.04.1
5.19.0-1022.23~22.04.1
5.19.0-1023.24~22.04.1
5.19.0-1024.25~22.04.1
5.19.0-1025.26~22.04.1
5.19.0-1027.28~22.04.1
5.19.0-1028.29~22.04.1
5.19.0-1030.30

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-6.2

Package

Name
linux-lowlatency-hwe-6.2
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1008.8~22.04.1
6.2.0-1009.9~22.04.1
6.2.0-1011.11~22.04.1
6.2.0-1012.12~22.04.1
6.2.0-1013.13~22.04.1
6.2.0-1014.14~22.04.1
6.2.0-1015.15~22.04.1
6.2.0-1016.16~22.04.1
6.2.0-1017.17~22.04.1
6.2.0-1018.18~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-6.5

Package

Name
linux-lowlatency-hwe-6.5
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-14.14.1~22.04.1
6.5.0-15.15.1.1~22.04.1
6.5.0-17.17.1.1.1~22.04.1
6.5.0-21.21.1~22.04.1
6.5.0-25.25.1~22.04.1
6.5.0-26.26.1~22.04.1
6.5.0-27.28.1~22.04.1
6.5.0-28.29.1~22.04.1
6.5.0-35.35.1~22.04.1
6.5.0-41.41.1~22.04.1
6.5.0-42.42.1~22.04.1
6.5.0-44.44.1~22.04.1
6.5.0-45.45.1~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-lowlatency-hwe-6.8

Package

Name
linux-lowlatency-hwe-6.8
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-44.44.1~22.04.1

Affected versions

6.*

6.8.0-38.38.1~22.04.2
6.8.0-40.40.1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-cloud-tools-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-headers-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-headers-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-modules-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-modules-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-tools-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-tools-6.8.0-44-lowlatency-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-nvidia

Package

Name
linux-nvidia
Purl
pkg:deb/ubuntu/linux-nvidia?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1005.5

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-buildinfo-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-buildinfo-5.15.0-1005-nvidia-64k"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-cloud-tools-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-headers-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-headers-5.15.0-1005-nvidia-64k"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-image-unsigned-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-image-unsigned-5.15.0-1005-nvidia-64k"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-modules-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-modules-5.15.0-1005-nvidia-64k"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-modules-extra-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-modules-iwlwifi-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-nvidia-cloud-tools-5.15.0-1005"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-nvidia-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-nvidia-headers-5.15.0-1005"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-nvidia-tools-5.15.0-1005"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-nvidia-tools-common"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-nvidia-tools-host"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-tools-5.15.0-1005-nvidia"
        },
        {
            "binary_version": "5.15.0-1005.5",
            "binary_name": "linux-tools-5.15.0-1005-nvidia-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-nvidia-6.2

Package

Name
linux-nvidia-6.2
Purl
pkg:deb/ubuntu/linux-nvidia-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1003.3~22.04.1
6.2.0-1009.9
6.2.0-1010.10
6.2.0-1011.11
6.2.0-1012.12
6.2.0-1013.13
6.2.0-1015.15

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-nvidia-6.5

Package

Name
linux-nvidia-6.5
Purl
pkg:deb/ubuntu/linux-nvidia-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1004.4
6.5.0-1007.7
6.5.0-1013.13
6.5.0-1014.14
6.5.0-1015.15
6.5.0-1018.18
6.5.0-1019.19
6.5.0-1021.22
6.5.0-1022.23
6.5.0-1023.24
6.5.0-1024.25

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-nvidia-6.8

Package

Name
linux-nvidia-6.8
Purl
pkg:deb/ubuntu/linux-nvidia-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1013.14~22.04.1

Affected versions

6.*

6.8.0-1008.8~22.04.1
6.8.0-1009.9~22.04.1
6.8.0-1010.10~22.04.1
6.8.0-1011.11~22.04.1
6.8.0-1012.12~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-headers-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-headers-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-dbgsym"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-modules-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-modules-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-modules-extra-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-modules-nvidia-fs-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-modules-nvidia-fs-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-nvidia-6.8-headers-6.8.0-1013"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-nvidia-6.8-tools-6.8.0-1013"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-tools-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14~22.04.1",
            "binary_name": "linux-tools-6.8.0-1013-nvidia-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-oem-5.17

Package

Name
linux-oem-5.17
Purl
pkg:deb/ubuntu/linux-oem-5.17?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.17.0-1003.3
5.17.0-1004.4
5.17.0-1006.6
5.17.0-1011.12
5.17.0-1012.13
5.17.0-1013.14
5.17.0-1014.15
5.17.0-1015.16
5.17.0-1016.17
5.17.0-1017.18
5.17.0-1018.19
5.17.0-1019.20
5.17.0-1020.21
5.17.0-1021.22
5.17.0-1024.25
5.17.0-1025.26
5.17.0-1026.27
5.17.0-1027.28
5.17.0-1028.29
5.17.0-1029.30
5.17.0-1030.31
5.17.0-1031.32
5.17.0-1032.33
5.17.0-1033.34
5.17.0-1034.35
5.17.0-1035.36

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-oem-6.0

Package

Name
linux-oem-6.0
Purl
pkg:deb/ubuntu/linux-oem-6.0?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.0.0-1006.6
6.0.0-1007.7
6.0.0-1008.8
6.0.0-1009.9
6.0.0-1010.10
6.0.0-1011.11
6.0.0-1012.12
6.0.0-1013.13
6.0.0-1014.14
6.0.0-1015.15
6.0.0-1016.16
6.0.0-1017.17
6.0.0-1018.18
6.0.0-1019.19
6.0.0-1020.20
6.0.0-1021.21

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-oem-6.1

Package

Name
linux-oem-6.1
Purl
pkg:deb/ubuntu/linux-oem-6.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.1.0-1004.4
6.1.0-1006.6
6.1.0-1007.7
6.1.0-1008.8
6.1.0-1009.9
6.1.0-1010.10
6.1.0-1012.12
6.1.0-1013.13
6.1.0-1014.14
6.1.0-1015.15
6.1.0-1016.16
6.1.0-1017.17
6.1.0-1019.19
6.1.0-1020.20
6.1.0-1021.21
6.1.0-1022.22
6.1.0-1023.23
6.1.0-1024.24
6.1.0-1025.25
6.1.0-1026.26
6.1.0-1027.27
6.1.0-1028.28
6.1.0-1029.29
6.1.0-1033.33
6.1.0-1034.34
6.1.0-1035.35
6.1.0-1036.36

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-oem-6.5

Package

Name
linux-oem-6.5
Purl
pkg:deb/ubuntu/linux-oem-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1003.3
6.5.0-1004.4
6.5.0-1006.6
6.5.0-1007.7
6.5.0-1008.8
6.5.0-1009.10
6.5.0-1011.12
6.5.0-1013.14
6.5.0-1014.15
6.5.0-1015.16
6.5.0-1016.17
6.5.0-1018.19
6.5.0-1019.20
6.5.0-1020.21
6.5.0-1022.23
6.5.0-1023.24
6.5.0-1024.25
6.5.0-1025.26
6.5.0-1027.28

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1008.10

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-buildinfo-5.13.0-1008-oracle"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-headers-5.13.0-1008-oracle"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-image-unsigned-5.13.0-1008-oracle"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-image-unsigned-5.13.0-1008-oracle-dbgsym"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-modules-5.13.0-1008-oracle"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-modules-extra-5.13.0-1008-oracle"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-oracle-headers-5.13.0-1008"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-oracle-tools-5.13.0-1008"
        },
        {
            "binary_version": "5.13.0-1008.10",
            "binary_name": "linux-tools-5.13.0-1008-oracle"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-oracle-6.5

Package

Name
linux-oracle-6.5
Purl
pkg:deb/ubuntu/linux-oracle-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1013.13~22.04.4
6.5.0-1014.14~22.04.1
6.5.0-1015.15~22.04.1
6.5.0-1016.16~22.04.1
6.5.0-1018.18~22.04.1
6.5.0-1019.19~22.04.1
6.5.0-1020.20~22.04.1
6.5.0-1021.21~22.04.1
6.5.0-1023.23~22.04.1
6.5.0-1024.24~22.04.1
6.5.0-1025.25~22.04.1
6.5.0-1026.26~22.04.1
6.5.0-1027.27~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-oracle-6.8

Package

Name
linux-oracle-6.8
Purl
pkg:deb/ubuntu/linux-oracle-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1012.12~22.04.1

Affected versions

6.*

6.8.0-1006.6~22.04.3
6.8.0-1008.8~22.04.1
6.8.0-1010.10~22.04.1
6.8.0-1011.11~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-headers-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-headers-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle-dbgsym"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-modules-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-modules-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-modules-extra-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-modules-extra-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-modules-iwlwifi-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-oracle-6.8-headers-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-oracle-6.8-tools-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-tools-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12~22.04.1",
            "binary_name": "linux-tools-6.8.0-1012-oracle-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1008.9

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-buildinfo-5.13.0-1008-raspi"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-buildinfo-5.13.0-1008-raspi-nolpae"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-headers-5.13.0-1008-raspi"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-headers-5.13.0-1008-raspi-nolpae"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-image-5.13.0-1008-raspi"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-image-5.13.0-1008-raspi-dbgsym"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-image-5.13.0-1008-raspi-nolpae"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-image-5.13.0-1008-raspi-nolpae-dbgsym"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-modules-5.13.0-1008-raspi"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-modules-5.13.0-1008-raspi-nolpae"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-modules-extra-5.13.0-1008-raspi"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-modules-extra-5.13.0-1008-raspi-nolpae"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-raspi-headers-5.13.0-1008"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-raspi-tools-5.13.0-1008"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-tools-5.13.0-1008-raspi"
        },
        {
            "binary_version": "5.13.0-1008.9",
            "binary_name": "linux-tools-5.13.0-1008-raspi-nolpae"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-realtime

Package

Name
linux-realtime
Purl
pkg:deb/ubuntu/linux-realtime?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.15.0-1032.35

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-riscv

Package

Name
linux-riscv
Purl
pkg:deb/ubuntu/linux-riscv?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.13.0-1004.4
5.13.0-1006.6+22.04.1
5.13.0-1007.7+22.04.1
5.13.0-1010.11+22.04.1
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1007.7
5.15.0-1008.8
5.15.0-1011.12
5.15.0-1012.13
5.15.0-1014.16
5.15.0-1015.17
5.15.0-1016.18
5.15.0-1017.19
5.15.0-1018.21
5.15.0-1019.22
5.15.0-1020.23
5.15.0-1022.26
5.15.0-1023.27
5.15.0-1026.30
5.15.0-1027.31
5.15.0-1028.32

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-riscv-5.19

Package

Name
linux-riscv-5.19
Purl
pkg:deb/ubuntu/linux-riscv-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1012.13~22.04.1
5.19.0-1015.16~22.04.1
5.19.0-1016.17~22.04.1
5.19.0-1017.18~22.04.1
5.19.0-1018.19~22.04.1
5.19.0-1019.21~22.04.1
5.19.0-1020.22~22.04.1
5.19.0-1021.23~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-riscv-6.5

Package

Name
linux-riscv-6.5
Purl
pkg:deb/ubuntu/linux-riscv-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-17.17.1.1~22.04.1
6.5.0-21.21.1~22.04.1
6.5.0-25.25.1~22.04.1
6.5.0-26.26.1~22.04.1
6.5.0-27.28.1~22.04.1
6.5.0-28.29.1~22.04.1
6.5.0-35.35.1~22.04.1
6.5.0-40.40.1~22.04.1
6.5.0-42.42.1~22.04.1
6.5.0-45.45.1~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-riscv-6.8

Package

Name
linux-riscv-6.8
Purl
pkg:deb/ubuntu/linux-riscv-6.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-44.44.1~22.04.1

Affected versions

6.*

6.8.0-38.38.1~22.04.1
6.8.0-39.39.1~22.04.1
6.8.0-40.40.1~22.04.1
6.8.0-41.41.1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-buildinfo-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-headers-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-image-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-image-6.8.0-44-generic-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-modules-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-riscv-6.8-headers-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-riscv-6.8-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1~22.04.1",
            "binary_name": "linux-tools-6.8.0-44-generic"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-starfive-5.19

Package

Name
linux-starfive-5.19
Purl
pkg:deb/ubuntu/linux-starfive-5.19?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.19.0-1014.16~22.04.1
5.19.0-1015.17~22.04.1
5.19.0-1016.18~22.04.1
5.19.0-1017.19~22.04.1
5.19.0-1018.20~22.04.1
5.19.0-1019.21~22.04.1
5.19.0-1020.22~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-starfive-6.2

Package

Name
linux-starfive-6.2
Purl
pkg:deb/ubuntu/linux-starfive-6.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.2.0-1006.7~22.04.1
6.2.0-1007.8~22.04.1
6.2.0-1009.10~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-starfive-6.5

Package

Name
linux-starfive-6.5
Purl
pkg:deb/ubuntu/linux-starfive-6.5?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.5.0-1007.8~22.04.1
6.5.0-1008.9~22.04.1
6.5.0-1009.10~22.04.1
6.5.0-1010.11~22.04.1
6.5.0-1011.12~22.04.1
6.5.0-1012.13~22.04.1
6.5.0-1014.15~22.04.1
6.5.0-1015.16~22.04.1
6.5.0-1016.17~22.04.1
6.5.0-1017.18~22.04.1
6.5.0-1018.19~22.04.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1022.26

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-buildinfo-5.15.0-1022-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-headers-5.15.0-1022-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-image-5.15.0-1022-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-image-5.15.0-1022-xilinx-zynqmp-dbgsym"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-modules-5.15.0-1022-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-tools-5.15.0-1022-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1022"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1022"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-xilinx-zynqmp-tools-common"
        },
        {
            "binary_version": "5.15.0-1022.26",
            "binary_name": "linux-xilinx-zynqmp-tools-host"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS:for:NVIDIA:BlueField / linux-bluefield

Package

Name
linux-bluefield
Purl
pkg:deb/ubuntu/linux-bluefield?arch=src?distro=bluefield/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1011.13

Ecosystem specific

{
    "availability": "Available for NVIDIA BlueField platforms",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-bluefield-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-bluefield-headers-5.15.0-1011"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-bluefield-tools-5.15.0-1011"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-bluefield-tools-host"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-buildinfo-5.15.0-1011-bluefield"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-headers-5.15.0-1011-bluefield"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-image-unsigned-5.15.0-1011-bluefield"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-image-unsigned-5.15.0-1011-bluefield-dbgsym"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-modules-5.15.0-1011-bluefield"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-modules-extra-5.15.0-1011-bluefield"
        },
        {
            "binary_version": "5.15.0-1011.13",
            "binary_name": "linux-tools-5.15.0-1011-bluefield"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-preview:22.04:LTS / linux-aws-fips

Package

Name
linux-aws-fips
Purl
pkg:deb/ubuntu/linux-aws-fips?arch=src?distro=fips-preview/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1051.56+fips1

Affected versions

5.*

5.15.0-1042.47+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1051"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-aws-fips-headers-5.15.0-1051"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-aws-fips-tools-5.15.0-1051"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-buildinfo-5.15.0-1051-aws-fips"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-cloud-tools-5.15.0-1051-aws-fips"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-headers-5.15.0-1051-aws-fips"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-1051-aws-fips"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-modules-5.15.0-1051-aws-fips"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-modules-extra-5.15.0-1051-aws-fips"
        },
        {
            "binary_version": "5.15.0-1051.56+fips1",
            "binary_name": "linux-tools-5.15.0-1051-aws-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-preview:22.04:LTS / linux-azure-fips

Package

Name
linux-azure-fips
Purl
pkg:deb/ubuntu/linux-azure-fips?arch=src?distro=fips-preview/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1053.61+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1053"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-azure-fips-headers-5.15.0-1053"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-azure-fips-tools-5.15.0-1053"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-buildinfo-5.15.0-1053-azure-fips"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-cloud-tools-5.15.0-1053-azure-fips"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-headers-5.15.0-1053-azure-fips"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-1053-azure-fips"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-modules-5.15.0-1053-azure-fips"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-modules-extra-5.15.0-1053-azure-fips"
        },
        {
            "binary_version": "5.15.0-1053.61+fips1",
            "binary_name": "linux-tools-5.15.0-1053-azure-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-preview:22.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips-preview/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-73.80+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-buildinfo-5.15.0-73-fips"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-fips-headers-5.15.0-73"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-fips-tools-5.15.0-73"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-fips-tools-host"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-headers-5.15.0-73-fips"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-73-fips"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-73-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-73-fips"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-modules-5.15.0-73-fips"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-modules-extra-5.15.0-73-fips"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-73-fips"
        },
        {
            "binary_version": "5.15.0-73.80+fips1",
            "binary_name": "linux-tools-5.15.0-73-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-preview:22.04:LTS / linux-gcp-fips

Package

Name
linux-gcp-fips
Purl
pkg:deb/ubuntu/linux-gcp-fips?arch=src?distro=fips-preview/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1048.56+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-gcp-fips-headers-5.15.0-1048"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-gcp-fips-tools-5.15.0-1048"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-headers-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-modules-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-tools-5.15.0-1048-gcp-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:22.04:LTS / linux-aws-fips

Package

Name
linux-aws-fips
Purl
pkg:deb/ubuntu/linux-aws-fips?arch=src?distro=fips-updates/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1052.57+fips1

Affected versions

5.*

5.15.0-1051.56+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1052"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-aws-fips-headers-5.15.0-1052"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-aws-fips-tools-5.15.0-1052"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-buildinfo-5.15.0-1052-aws-fips"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-cloud-tools-5.15.0-1052-aws-fips"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-headers-5.15.0-1052-aws-fips"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1052-aws-fips"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1052-aws-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-1052-aws-fips"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-modules-5.15.0-1052-aws-fips"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-modules-extra-5.15.0-1052-aws-fips"
        },
        {
            "binary_version": "5.15.0-1052.57+fips1",
            "binary_name": "linux-tools-5.15.0-1052-aws-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:22.04:LTS / linux-azure-fips

Package

Name
linux-azure-fips
Purl
pkg:deb/ubuntu/linux-azure-fips?arch=src?distro=fips-updates/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1058.66+fips1

Affected versions

5.*

5.15.0-1053.61+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1058"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-azure-fips-headers-5.15.0-1058"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-azure-fips-tools-5.15.0-1058"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-buildinfo-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-cloud-tools-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-headers-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1058-azure-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-modules-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-modules-extra-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-1058-azure-fips"
        },
        {
            "binary_version": "5.15.0-1058.66+fips1",
            "binary_name": "linux-tools-5.15.0-1058-azure-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:22.04:LTS / linux-fips

Package

Name
linux-fips
Purl
pkg:deb/ubuntu/linux-fips?arch=src?distro=fips-updates/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-92.102+fips1

Affected versions

5.*

5.15.0-73.80+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-buildinfo-5.15.0-92-fips"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-fips-headers-5.15.0-92"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-fips-tools-5.15.0-92"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-fips-tools-host"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-headers-5.15.0-92-fips"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-92-fips"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-92-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-92-fips"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-modules-5.15.0-92-fips"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-modules-extra-5.15.0-92-fips"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-92-fips"
        },
        {
            "binary_version": "5.15.0-92.102+fips1",
            "binary_name": "linux-tools-5.15.0-92-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:Pro:FIPS-updates:22.04:LTS / linux-gcp-fips

Package

Name
linux-gcp-fips
Purl
pkg:deb/ubuntu/linux-gcp-fips?arch=src?distro=fips-updates/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1048.56+fips1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-gcp-fips-headers-5.15.0-1048"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-gcp-fips-tools-5.15.0-1048"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-headers-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips-dbgsym"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-modules-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips"
        },
        {
            "binary_version": "5.15.0-1048.56+fips1",
            "binary_name": "linux-tools-5.15.0-1048-gcp-fips"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-intel-iot-realtime

Package

Name
linux-intel-iot-realtime
Purl
pkg:deb/ubuntu/linux-intel-iot-realtime?arch=src?distro=realtime/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1021.26

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-buildinfo-5.15.0-1021-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-cloud-tools-5.15.0-1021-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-headers-5.15.0-1021-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-image-unsigned-5.15.0-1021-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-image-unsigned-5.15.0-1021-intel-iot-realtime-dbgsym"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-intel-iot-realtime-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-intel-iot-realtime-tools-common"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-intel-iot-realtime-tools-host"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-modules-5.15.0-1021-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-modules-extra-5.15.0-1021-intel-iot-realtime"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-tools-5.15.0-1021-intel-iot-realtime"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:22.04:LTS / linux-realtime

Package

Name
linux-realtime
Purl
pkg:deb/ubuntu/linux-realtime?arch=src?distro=realtime/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1006.6

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-buildinfo-5.15.0-1006-realtime"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-cloud-tools-5.15.0-1006-realtime"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-headers-5.15.0-1006-realtime"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-image-5.15.0-1006-realtime"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-modules-5.15.0-1006-realtime"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-modules-extra-5.15.0-1006-realtime"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-realtime-cloud-tools-5.15.0-1006"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-realtime-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-realtime-headers-5.15.0-1006"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-realtime-tools-5.15.0-1006"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-realtime-tools-common"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-realtime-tools-host"
        },
        {
            "binary_version": "5.15.0-1006.6",
            "binary_name": "linux-tools-5.15.0-1006-realtime"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-7.7

Affected versions

6.*

6.8.0-31.31

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-bpf-dev"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-buildinfo-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-buildinfo-6.11.0-7-generic-64k"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-cloud-tools-6.11.0-7"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-cloud-tools-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-headers-6.11.0-7"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-headers-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-headers-6.11.0-7-generic-64k"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-image-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-image-6.11.0-7-generic-dbgsym"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-image-unsigned-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-image-unsigned-6.11.0-7-generic-64k"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-image-unsigned-6.11.0-7-generic-64k-dbgsym"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-image-unsigned-6.11.0-7-generic-dbgsym"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-lib-rust-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-6.11.0-7-generic-64k"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-extra-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-ipu6-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-ipu7-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-iwlwifi-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-usbio-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-modules-vision-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-source-6.11.0"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-tools-6.11.0-7"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-tools-6.11.0-7-generic"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-tools-6.11.0-7-generic-64k"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "6.11.0-7.7",
            "binary_name": "linux-tools-host"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-1002.2

Affected versions

6.*

6.8.0-1008.8

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-aws-cloud-tools-6.11.0-1002"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-aws-headers-6.11.0-1002"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-aws-tools-6.11.0-1002"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-buildinfo-6.11.0-1002-aws"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-cloud-tools-6.11.0-1002-aws"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-headers-6.11.0-1002-aws"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-image-unsigned-6.11.0-1002-aws"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-image-unsigned-6.11.0-1002-aws-dbgsym"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-modules-6.11.0-1002-aws"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-modules-extra-6.11.0-1002-aws"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-tools-6.11.0-1002-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-1003.3

Affected versions

6.*

6.8.0-1007.7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-azure-cloud-tools-6.11.0-1003"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-azure-headers-6.11.0-1003"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-azure-tools-6.11.0-1003"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-buildinfo-6.11.0-1003-azure"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-cloud-tools-6.11.0-1003-azure"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-headers-6.11.0-1003-azure"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-image-unsigned-6.11.0-1003-azure"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-image-unsigned-6.11.0-1003-azure-dbgsym"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-modules-6.11.0-1003-azure"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-modules-extra-6.11.0-1003-azure"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-modules-iwlwifi-6.11.0-1003-azure"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-tools-6.11.0-1003-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-1001.1

Affected versions

6.*

6.8.0-1007.7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-buildinfo-6.11.0-1001-gcp"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-gcp-headers-6.11.0-1001"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-gcp-tools-6.11.0-1001"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-headers-6.11.0-1001-gcp"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-image-unsigned-6.11.0-1001-gcp"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-image-unsigned-6.11.0-1001-gcp-dbgsym"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-modules-6.11.0-1001-gcp"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-modules-extra-6.11.0-1001-gcp"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-tools-6.11.0-1001-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-1002.2

Affected versions

6.*

6.8.0-31.31.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-buildinfo-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-buildinfo-6.11.0-1002-lowlatency-64k"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-cloud-tools-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-headers-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-headers-6.11.0-1002-lowlatency-64k"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-image-unsigned-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-image-unsigned-6.11.0-1002-lowlatency-64k"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-image-unsigned-6.11.0-1002-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-image-unsigned-6.11.0-1002-lowlatency-dbgsym"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-lowlatency-cloud-tools-6.11.0-1002"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-lowlatency-cloud-tools-common"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-lowlatency-headers-6.11.0-1002"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-lowlatency-lib-rust-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-lowlatency-tools-6.11.0-1002"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-lowlatency-tools-common"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-lowlatency-tools-host"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-modules-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-modules-6.11.0-1002-lowlatency-64k"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-modules-iwlwifi-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-tools-6.11.0-1002-lowlatency"
        },
        {
            "binary_version": "6.11.0-1002.2",
            "binary_name": "linux-tools-6.11.0-1002-lowlatency-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-1004.4

Affected versions

6.*

6.8.0-1005.5

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-buildinfo-6.11.0-1004-oracle"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-buildinfo-6.11.0-1004-oracle-64k"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-headers-6.11.0-1004-oracle"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-headers-6.11.0-1004-oracle-64k"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-image-unsigned-6.11.0-1004-oracle"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-image-unsigned-6.11.0-1004-oracle-64k"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-image-unsigned-6.11.0-1004-oracle-64k-dbgsym"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-image-unsigned-6.11.0-1004-oracle-dbgsym"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-modules-6.11.0-1004-oracle"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-modules-6.11.0-1004-oracle-64k"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-modules-extra-6.11.0-1004-oracle"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-modules-extra-6.11.0-1004-oracle-64k"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-oracle-headers-6.11.0-1004"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-oracle-tools-6.11.0-1004"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-tools-6.11.0-1004-oracle"
        },
        {
            "binary_version": "6.11.0-1004.4",
            "binary_name": "linux-tools-6.11.0-1004-oracle-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-1003.3

Affected versions

6.*

6.8.0-1004.4

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-buildinfo-6.11.0-1003-raspi"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-headers-6.11.0-1003-raspi"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-image-6.11.0-1003-raspi"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-image-6.11.0-1003-raspi-dbgsym"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-modules-6.11.0-1003-raspi"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-raspi-headers-6.11.0-1003"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-raspi-tools-6.11.0-1003"
        },
        {
            "binary_version": "6.11.0-1003.3",
            "binary_name": "linux-tools-6.11.0-1003-raspi"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-realtime

Package

Name
linux-realtime
Purl
pkg:deb/ubuntu/linux-realtime?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-1001.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-buildinfo-6.11.0-1001-realtime"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-cloud-tools-6.11.0-1001-realtime"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-headers-6.11.0-1001-realtime"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-image-unsigned-6.11.0-1001-realtime"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-image-unsigned-6.11.0-1001-realtime-dbgsym"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-modules-6.11.0-1001-realtime"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-modules-extra-6.11.0-1001-realtime"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-modules-iwlwifi-6.11.0-1001-realtime"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-realtime-cloud-tools-6.11.0-1001"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-realtime-headers-6.11.0-1001"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-realtime-tools-6.11.0-1001"
        },
        {
            "binary_version": "6.11.0-1001.1",
            "binary_name": "linux-tools-6.11.0-1001-realtime"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.10 / linux-riscv

Package

Name
linux-riscv
Purl
pkg:deb/ubuntu/linux-riscv?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.0-8.8.1

Affected versions

6.*

6.8.0-31.31.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-buildinfo-6.11.0-8-generic"
        },
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-headers-6.11.0-8-generic"
        },
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-image-6.11.0-8-generic"
        },
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-image-6.11.0-8-generic-dbgsym"
        },
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-modules-6.11.0-8-generic"
        },
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-riscv-headers-6.11.0-8"
        },
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-riscv-tools-6.11.0-8"
        },
        {
            "binary_version": "6.11.0-8.8.1",
            "binary_name": "linux-tools-6.11.0-8-generic"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-44.44

Affected versions

6.*

6.5.0-9.9
6.6.0-14.14
6.8.0-11.11
6.8.0-20.20
6.8.0-22.22
6.8.0-28.28
6.8.0-31.31
6.8.0-35.35
6.8.0-36.36
6.8.0-38.38
6.8.0-39.39
6.8.0-40.40
6.8.0-41.41

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-buildinfo-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-buildinfo-6.8.0-44-generic-64k"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-cloud-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-cloud-tools-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-headers-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-headers-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-headers-6.8.0-44-generic-64k"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-image-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-image-6.8.0-44-generic-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-image-unsigned-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-image-unsigned-6.8.0-44-generic-64k"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-image-unsigned-6.8.0-44-generic-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-image-unsigned-6.8.0-44-generic-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-lib-rust-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-modules-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-modules-6.8.0-44-generic-64k"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-modules-extra-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-modules-ipu6-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-modules-iwlwifi-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-modules-usbio-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-source-6.8.0"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-tools-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-tools-6.8.0-44-generic-64k"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "6.8.0-44.44",
            "binary_name": "linux-tools-host"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1015.16

Affected versions

6.*

6.5.0-1008.8
6.6.0-1001.1
6.8.0-1001.1
6.8.0-1006.6
6.8.0-1008.8
6.8.0-1009.9
6.8.0-1010.10
6.8.0-1011.12
6.8.0-1012.13
6.8.0-1013.14
6.8.0-1014.15

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-aws-cloud-tools-6.8.0-1015"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-aws-headers-6.8.0-1015"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-aws-tools-6.8.0-1015"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-buildinfo-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-cloud-tools-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-headers-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-image-unsigned-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-image-unsigned-6.8.0-1015-aws-dbgsym"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-modules-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-modules-extra-6.8.0-1015-aws"
        },
        {
            "binary_version": "6.8.0-1015.16",
            "binary_name": "linux-tools-6.8.0-1015-aws"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1014.16

Affected versions

6.*

6.5.0-1007.7
6.6.0-1001.1
6.8.0-1001.1
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1007.7
6.8.0-1008.8
6.8.0-1009.9
6.8.0-1010.10
6.8.0-1012.14
6.8.0-1013.15

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-azure-cloud-tools-6.8.0-1014"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-azure-headers-6.8.0-1014"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-azure-tools-6.8.0-1014"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-buildinfo-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-cloud-tools-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-headers-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-image-unsigned-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-image-unsigned-6.8.0-1014-azure-dbgsym"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-modules-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-modules-extra-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-modules-involflt-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-modules-iwlwifi-6.8.0-1014-azure"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-tools-6.8.0-1014-azure"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1014.16

Affected versions

6.*

6.5.0-1007.7
6.6.0-1001.1
6.8.0-1002.2
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1007.7
6.8.0-1008.9
6.8.0-1009.10
6.8.0-1010.11
6.8.0-1011.12
6.8.0-1012.13
6.8.0-1013.14

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-buildinfo-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-gcp-headers-6.8.0-1014"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-gcp-tools-6.8.0-1014"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-headers-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-image-unsigned-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-image-unsigned-6.8.0-1014-gcp-dbgsym"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-modules-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-modules-extra-6.8.0-1014-gcp"
        },
        {
            "binary_version": "6.8.0-1014.16",
            "binary_name": "linux-tools-6.8.0-1014-gcp"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1010.13

Affected versions

6.*

6.8.0-1003.5
6.8.0-1004.7
6.8.0-1005.8
6.8.0-1006.9
6.8.0-1007.10
6.8.0-1008.11
6.8.0-1009.12

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-buildinfo-6.8.0-1010-gke"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-gke-headers-6.8.0-1010"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-gke-tools-6.8.0-1010"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-headers-6.8.0-1010-gke"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-image-unsigned-6.8.0-1010-gke"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-image-unsigned-6.8.0-1010-gke-dbgsym"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-modules-6.8.0-1010-gke"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-modules-extra-6.8.0-1010-gke"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-modules-iwlwifi-6.8.0-1010-gke"
        },
        {
            "binary_version": "6.8.0-1010.13",
            "binary_name": "linux-tools-6.8.0-1010-gke"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-gkeop

Package

Name
linux-gkeop
Purl
pkg:deb/ubuntu/linux-gkeop?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1001.3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-buildinfo-6.8.0-1001-gkeop"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-cloud-tools-6.8.0-1001-gkeop"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-gkeop-cloud-tools-6.8.0-1001"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-gkeop-headers-6.8.0-1001"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-gkeop-tools-6.8.0-1001"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-headers-6.8.0-1001-gkeop"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-image-unsigned-6.8.0-1001-gkeop-dbgsym"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-modules-6.8.0-1001-gkeop"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-modules-extra-6.8.0-1001-gkeop"
        },
        {
            "binary_version": "6.8.0-1001.3",
            "binary_name": "linux-tools-6.8.0-1001-gkeop"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-ibm

Package

Name
linux-ibm
Purl
pkg:deb/ubuntu/linux-ibm?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1012.12

Affected versions

6.*

6.5.0-1009.9
6.8.0-1001.1
6.8.0-1003.3
6.8.0-1004.4
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1007.7
6.8.0-1008.8
6.8.0-1009.9
6.8.0-1010.10
6.8.0-1011.11

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-buildinfo-6.8.0-1012-ibm"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-headers-6.8.0-1012-ibm"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-ibm-cloud-tools-common"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-ibm-headers-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-ibm-source-6.8.0"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-ibm-tools-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-ibm"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-ibm-dbgsym"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-6.8.0-1012-ibm"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-extra-6.8.0-1012-ibm"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-iwlwifi-6.8.0-1012-ibm"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-tools-6.8.0-1012-ibm"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-44.44.1

Affected versions

6.*

6.5.0-9.9.1
6.6.0-14.14.1
6.8.0-7.7.1
6.8.0-25.25.3
6.8.0-28.28.1
6.8.0-31.31.1
6.8.0-35.35.1
6.8.0-36.36.1
6.8.0-38.38.1
6.8.0-39.39.1
6.8.0-40.40.1
6.8.0-41.41.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-buildinfo-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-buildinfo-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-cloud-tools-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-headers-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-headers-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-image-unsigned-6.8.0-44-lowlatency-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-lowlatency-cloud-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-lowlatency-cloud-tools-common"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-lowlatency-headers-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-lowlatency-lib-rust-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-lowlatency-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-lowlatency-tools-common"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-lowlatency-tools-host"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-modules-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-modules-6.8.0-44-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-modules-iwlwifi-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-tools-6.8.0-44-lowlatency"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-tools-6.8.0-44-lowlatency-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-nvidia

Package

Name
linux-nvidia
Purl
pkg:deb/ubuntu/linux-nvidia?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1013.14

Affected versions

6.*

6.8.0-1007.7
6.8.0-1008.8
6.8.0-1009.9
6.8.0-1010.10
6.8.0-1011.11
6.8.0-1012.12

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-buildinfo-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-buildinfo-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-headers-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-headers-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-dbgsym"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-modules-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-modules-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-modules-extra-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-modules-nvidia-fs-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-modules-nvidia-fs-6.8.0-1013-nvidia-64k"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-nvidia-headers-6.8.0-1013"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-nvidia-tools-6.8.0-1013"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-nvidia-tools-host"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-tools-6.8.0-1013-nvidia"
        },
        {
            "binary_version": "6.8.0-1013.14",
            "binary_name": "linux-tools-6.8.0-1013-nvidia-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-nvidia-lowlatency

Package

Name
linux-nvidia-lowlatency
Purl
pkg:deb/ubuntu/linux-nvidia-lowlatency?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1013.14.1

Affected versions

6.*

6.8.0-1009.9.1
6.8.0-1011.11.1
6.8.0-1012.12.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-buildinfo-6.8.0-1013-nvidia-lowlatency"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-buildinfo-6.8.0-1013-nvidia-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-headers-6.8.0-1013-nvidia-lowlatency"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-headers-6.8.0-1013-nvidia-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-lowlatency"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-image-unsigned-6.8.0-1013-nvidia-lowlatency-dbgsym"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-modules-6.8.0-1013-nvidia-lowlatency"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-modules-6.8.0-1013-nvidia-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-modules-extra-6.8.0-1013-nvidia-lowlatency"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-modules-nvidia-fs-6.8.0-1013-nvidia-lowlatency-64k"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1013"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1013"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-nvidia-lowlatency-tools-host"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-tools-6.8.0-1013-nvidia-lowlatency"
        },
        {
            "binary_version": "6.8.0-1013.14.1",
            "binary_name": "linux-tools-6.8.0-1013-nvidia-lowlatency-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-oem-6.8

Package

Name
linux-oem-6.8
Purl
pkg:deb/ubuntu/linux-oem-6.8?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1012.12

Affected versions

6.*

6.8.0-1003.3
6.8.0-1004.4
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1007.7
6.8.0-1008.8
6.8.0-1009.9
6.8.0-1010.10
6.8.0-1011.11

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-buildinfo-6.8.0-1012-oem"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-headers-6.8.0-1012-oem"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oem"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oem-dbgsym"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-6.8.0-1012-oem"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-ipu6-6.8.0-1012-oem"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-iwlwifi-6.8.0-1012-oem"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-usbio-6.8.0-1012-oem"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-oem-6.8-headers-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-oem-6.8-tools-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-tools-6.8.0-1012-oem"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1012.12

Affected versions

6.*

6.5.0-1010.10
6.6.0-1001.1
6.8.0-1001.1
6.8.0-1004.4
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1008.8
6.8.0-1010.10
6.8.0-1011.11

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-buildinfo-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-buildinfo-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-headers-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-headers-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-image-unsigned-6.8.0-1012-oracle-dbgsym"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-extra-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-extra-6.8.0-1012-oracle-64k"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-modules-iwlwifi-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-oracle-headers-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-oracle-tools-6.8.0-1012"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-tools-6.8.0-1012-oracle"
        },
        {
            "binary_version": "6.8.0-1012.12",
            "binary_name": "linux-tools-6.8.0-1012-oracle-64k"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1011.12

Affected versions

6.*

6.5.0-1005.7
6.7.0-1001.1
6.8.0-1001.1
6.8.0-1002.2
6.8.0-1003.3
6.8.0-1004.4
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1007.7
6.8.0-1008.8
6.8.0-1009.10
6.8.0-1010.11

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-buildinfo-6.8.0-1011-raspi"
        },
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-headers-6.8.0-1011-raspi"
        },
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-image-6.8.0-1011-raspi"
        },
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-image-6.8.0-1011-raspi-dbgsym"
        },
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-modules-6.8.0-1011-raspi"
        },
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-raspi-headers-6.8.0-1011"
        },
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-raspi-tools-6.8.0-1011"
        },
        {
            "binary_version": "6.8.0-1011.12",
            "binary_name": "linux-tools-6.8.0-1011-raspi"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-riscv

Package

Name
linux-riscv
Purl
pkg:deb/ubuntu/linux-riscv?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-44.44.1

Affected versions

6.*

6.5.0-9.9.1
6.8.0-20.20.1
6.8.0-28.28.1
6.8.0-31.31.1
6.8.0-35.35.1
6.8.0-36.36.1
6.8.0-38.38.1
6.8.0-39.39.1
6.8.0-40.40.1
6.8.0-41.41.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-buildinfo-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-headers-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-image-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-image-6.8.0-44-generic-dbgsym"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-modules-6.8.0-44-generic"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-riscv-headers-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-riscv-tools-6.8.0-44"
        },
        {
            "binary_version": "6.8.0-44.44.1",
            "binary_name": "linux-tools-6.8.0-44-generic"
        }
    ],
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-raspi-realtime

Package

Name
linux-raspi-realtime
Purl
pkg:deb/ubuntu/linux-raspi-realtime?arch=src?distro=realtime/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.7.0-2001.1
6.8.0-2001.1
6.8.0-2002.2
6.8.0-2004.4
6.8.0-2005.5
6.8.0-2006.6
6.8.0-2007.7
6.8.0-2008.8
6.8.0-2009.9
6.8.0-2010.10
6.8.0-2011.11
6.8.0-2012.12
6.8.0-2013.14

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}

Ubuntu:24.04:LTS / linux-realtime

Package

Name
linux-realtime
Purl
pkg:deb/ubuntu/linux-realtime?arch=src?distro=realtime/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.8.0-1008.19
6.8.1-1001.1
6.8.1-1002.2
6.8.1-1003.3
6.8.1-1004.4
6.8.1-1005.5
6.8.1-1006.6
6.8.1-1007.7
6.8.1-1008.8
6.8.1-1009.9
6.8.1-1010.10
6.8.1-1011.11

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Requires privilege or physical access to remove the driver to trigger the vulnerability."
}