In the Linux kernel, the following vulnerability has been resolved: jfs: Fix uaf in dbFreeBits [syzbot reported] ================================================================== BUG: KASAN: slab-use-after-free in _mutexlockcommon kernel/locking/mutex.c:587 [inline] BUG: KASAN: slab-use-after-free in _mutexlock+0xfe/0xd70 kernel/locking/mutex.c:752 Read of size 8 at addr ffff8880229254b0 by task syz-executor357/5216 CPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 Call Trace: <TASK> _dumpstack lib/dumpstack.c:93 [inline] dumpstacklvl+0x241/0x360 lib/dumpstack.c:119 printaddressdescription mm/kasan/report.c:377 [inline] printreport+0x169/0x550 mm/kasan/report.c:488 kasanreport+0x143/0x180 mm/kasan/report.c:601 _mutexlockcommon kernel/locking/mutex.c:587 [inline] _mutexlock+0xfe/0xd70 kernel/locking/mutex.c:752 dbFreeBits+0x7ea/0xd90 fs/jfs/jfsdmap.c:2390 dbFreeDmap fs/jfs/jfsdmap.c:2089 [inline] dbFree+0x35b/0x680 fs/jfs/jfsdmap.c:409 dbDiscardAG+0x8a9/0xa20 fs/jfs/jfsdmap.c:1650 jfsioctrim+0x433/0x670 fs/jfs/jfsdiscard.c:100 jfsioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131 vfsioctl fs/ioctl.c:51 [inline] _dosysioctl fs/ioctl.c:907 [inline] _sesysioctl+0xfc/0x170 fs/ioctl.c:893 dosyscallx64 arch/x86/entry/common.c:52 [inline] dosyscall64+0xf3/0x230 arch/x86/entry/common.c:83 Freed by task 5218: kasansavestack mm/kasan/common.c:47 [inline] kasansavetrack+0x3f/0x80 mm/kasan/common.c:68 kasansavefreeinfo+0x40/0x50 mm/kasan/generic.c:579 poisonslabobject+0xe0/0x150 mm/kasan/common.c:240 _kasanslabfree+0x37/0x60 mm/kasan/common.c:256 kasanslabfree include/linux/kasan.h:184 [inline] slabfreehook mm/slub.c:2252 [inline] slabfree mm/slub.c:4473 [inline] kfree+0x149/0x360 mm/slub.c:4594 dbUnmount+0x11d/0x190 fs/jfs/jfsdmap.c:278 jfsmountrw+0x4ac/0x6a0 fs/jfs/jfsmount.c:247 jfsremount+0x3d1/0x6b0 fs/jfs/super.c:454 reconfiguresuper+0x445/0x880 fs/super.c:1083 vfscmdreconfigure fs/fsopen.c:263 [inline] vfsfsconfiglocked fs/fsopen.c:292 [inline] _dosysfsconfig fs/fsopen.c:473 [inline] _sesysfsconfig+0xb6e/0xf80 fs/fsopen.c:345 dosyscallx64 arch/x86/entry/common.c:52 [inline] dosyscall64+0xf3/0x230 arch/x86/entry/common.c:83 entrySYSCALL64afterhwframe+0x77/0x7f [Analysis] There are two paths (dbUnmount and jfsioctrim) that generate race condition when accessing bmap, which leads to the occurrence of uaf. Use the lock s_umount to synchronize them, in order to avoid uaf caused by race condition.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1142", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-aws-5.4-headers-5.4.0-1142", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-aws-5.4-tools-5.4.0-1142", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-buildinfo-5.4.0-1142-aws", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-cloud-tools-5.4.0-1142-aws", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-headers-5.4.0-1142-aws", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1142-aws", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1142-aws-dbgsym", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-modules-5.4.0-1142-aws", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-modules-extra-5.4.0-1142-aws", "binary_version": "5.4.0-1142.152~18.04.1" }, { "binary_name": "linux-tools-5.4.0-1142-aws", "binary_version": "5.4.0-1142.152~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1145", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-azure-5.4-headers-5.4.0-1145", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-azure-5.4-tools-5.4.0-1145", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-buildinfo-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-cloud-tools-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-headers-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1145-azure-dbgsym", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-modules-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-modules-extra-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152~18.04.1" }, { "binary_name": "linux-tools-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-gcp-5.4-headers-5.4.0-1143", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-gcp-5.4-tools-5.4.0-1143", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-headers-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1143-gcp-dbgsym", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-modules-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-modules-extra-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152~18.04.1" }, { "binary_name": "linux-tools-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "block-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "crypto-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "dasd-extra-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "dasd-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "fat-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "fb-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "firewire-core-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "floppy-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "fs-core-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "fs-secondary-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "input-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "ipmi-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "kernel-image-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-buildinfo-5.4.0-208-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-buildinfo-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-cloud-tools-5.4.0-208-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-cloud-tools-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-headers-5.4.0-208-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-headers-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-208", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-hwe-5.4-cloud-tools-common", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-hwe-5.4-headers-5.4.0-208", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-hwe-5.4-source-5.4.0", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-hwe-5.4-tools-5.4.0-208", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-hwe-5.4-tools-common", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-hwe-5.4-udebs-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-208-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-208-generic-dbgsym", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-208-lowlatency-dbgsym", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-modules-5.4.0-208-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-modules-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-modules-extra-5.4.0-208-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-tools-5.4.0-208-generic", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "linux-tools-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "md-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "message-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "mouse-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "multipath-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "nfs-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "nic-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "nic-pcmcia-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "nic-shared-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "nic-usb-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "parport-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "pata-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "pcmcia-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "pcmcia-storage-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "plip-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "ppp-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "sata-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "scsi-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "serial-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "storage-core-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "usb-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "virtio-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" }, { "binary_name": "vlan-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-headers-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-ibm-5.4-cloud-tools-common", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-ibm-5.4-headers-5.4.0-1086", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-ibm-5.4-source-5.4.0", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-ibm-5.4-tools-5.4.0-1086", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-ibm-5.4-tools-common", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1086-ibm-dbgsym", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-modules-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-modules-extra-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91~18.04.1" }, { "binary_name": "linux-tools-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-headers-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-image-unsigned-5.4.0-1138-oracle-dbgsym", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-modules-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-modules-extra-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-oracle-5.4-headers-5.4.0-1138", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-oracle-5.4-tools-5.4.0-1138", "binary_version": "5.4.0-1138.147~18.04.1" }, { "binary_name": "linux-tools-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142~18.04.1" }, { "binary_name": "linux-headers-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142~18.04.1" }, { "binary_name": "linux-image-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142~18.04.1" }, { "binary_name": "linux-image-5.4.0-1129-raspi-dbgsym", "binary_version": "5.4.0-1129.142~18.04.1" }, { "binary_name": "linux-modules-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142~18.04.1" }, { "binary_name": "linux-raspi-5.4-headers-5.4.0-1129", "binary_version": "5.4.0-1129.142~18.04.1" }, { "binary_name": "linux-raspi-5.4-tools-5.4.0-1129", "binary_version": "5.4.0-1129.142~18.04.1" }, { "binary_name": "linux-tools-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142~18.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "block-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "block-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "crypto-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "crypto-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "dasd-extra-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "dasd-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "fat-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "fat-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "fb-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "firewire-core-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "floppy-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "fs-core-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "fs-core-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "fs-secondary-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "fs-secondary-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "input-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "input-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "ipmi-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "ipmi-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "kernel-image-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "kernel-image-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-buildinfo-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-buildinfo-5.4.0-208-generic-lpae", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-buildinfo-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-cloud-tools-5.4.0-208", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-cloud-tools-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-cloud-tools-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-doc", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-headers-5.4.0-208", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-headers-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-headers-5.4.0-208-generic-lpae", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-headers-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-5.4.0-208-generic-dbgsym", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-5.4.0-208-generic-lpae", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-5.4.0-208-generic-lpae-dbgsym", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-unsigned-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-unsigned-5.4.0-208-generic-dbgsym", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-unsigned-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-image-unsigned-5.4.0-208-lowlatency-dbgsym", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-libc-dev", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-modules-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-modules-5.4.0-208-generic-lpae", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-modules-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-modules-extra-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-source-5.4.0", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-tools-5.4.0-208", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-tools-5.4.0-208-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-tools-5.4.0-208-generic-lpae", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-tools-5.4.0-208-lowlatency", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-tools-common", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-tools-host", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-udebs-generic", "binary_version": "5.4.0-208.228" }, { "binary_name": "linux-udebs-generic-lpae", "binary_version": "5.4.0-208.228" }, { "binary_name": "md-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "md-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "message-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "mouse-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "mouse-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "multipath-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "multipath-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nfs-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nfs-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nic-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nic-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nic-pcmcia-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nic-shared-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nic-shared-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nic-usb-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "nic-usb-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "parport-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "parport-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "pata-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "pcmcia-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "pcmcia-storage-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "plip-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "plip-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "ppp-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "ppp-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "sata-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "sata-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "scsi-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "scsi-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "serial-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "storage-core-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "storage-core-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "usb-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "usb-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "virtio-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "vlan-modules-5.4.0-208-generic-di", "binary_version": "5.4.0-208.228" }, { "binary_name": "vlan-modules-5.4.0-208-generic-lpae-di", "binary_version": "5.4.0-208.228" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-5.4.0-1140", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-aws-headers-5.4.0-1140", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-aws-tools-5.4.0-1140", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-buildinfo-5.4.0-1140-aws", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-cloud-tools-5.4.0-1140-aws", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-headers-5.4.0-1140-aws", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-image-unsigned-5.4.0-1140-aws", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-image-unsigned-5.4.0-1140-aws-dbgsym", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-modules-5.4.0-1140-aws", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-modules-extra-5.4.0-1140-aws", "binary_version": "5.4.0-1140.150" }, { "binary_name": "linux-tools-5.4.0-1140-aws", "binary_version": "5.4.0-1140.150" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1073", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-aws-5.15-headers-5.15.0-1073", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-aws-5.15-tools-5.15.0-1073", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-aws-dbgsym", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-5.4.0-1145", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-azure-headers-5.4.0-1145", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-azure-tools-5.4.0-1145", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-buildinfo-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-cloud-tools-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-headers-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-image-unsigned-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-image-unsigned-5.4.0-1145-azure-dbgsym", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-modules-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-modules-extra-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152" }, { "binary_name": "linux-tools-5.4.0-1145-azure", "binary_version": "5.4.0-1145.152" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1078", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-azure-5.15-headers-5.15.0-1078", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-azure-5.15-tools-5.15.0-1078", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1078-azure-dbgsym", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-modules-involflt-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-bluefield-headers-5.4.0-1099", "binary_version": "5.4.0-1099.106" }, { "binary_name": "linux-bluefield-tools-5.4.0-1099", "binary_version": "5.4.0-1099.106" }, { "binary_name": "linux-buildinfo-5.4.0-1099-bluefield", "binary_version": "5.4.0-1099.106" }, { "binary_name": "linux-headers-5.4.0-1099-bluefield", "binary_version": "5.4.0-1099.106" }, { "binary_name": "linux-image-unsigned-5.4.0-1099-bluefield", "binary_version": "5.4.0-1099.106" }, { "binary_name": "linux-image-unsigned-5.4.0-1099-bluefield-dbgsym", "binary_version": "5.4.0-1099.106" }, { "binary_name": "linux-modules-5.4.0-1099-bluefield", "binary_version": "5.4.0-1099.106" }, { "binary_name": "linux-tools-5.4.0-1099-bluefield", "binary_version": "5.4.0-1099.106" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-gcp-headers-5.4.0-1143", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-gcp-tools-5.4.0-1143", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-headers-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-image-unsigned-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-image-unsigned-5.4.0-1143-gcp-dbgsym", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-modules-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-modules-extra-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152" }, { "binary_name": "linux-tools-5.4.0-1143-gcp", "binary_version": "5.4.0-1143.152" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-gcp-5.15-headers-5.15.0-1072", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-gcp-5.15-tools-5.15.0-1072", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-gcp-dbgsym", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-headers-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-headers-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-headers-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-127", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-hwe-5.15-headers-5.15.0-127", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-hwe-5.15-tools-5.15.0-127", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-5.15.0-127-generic-dbgsym", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-5.15.0-127-generic-lpae-dbgsym", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic-64k-dbgsym", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic-dbgsym", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-tools-5.15.0-127-generic", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-tools-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-tools-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-headers-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-ibm-cloud-tools-common", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-ibm-headers-5.4.0-1086", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-ibm-source-5.4.0", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-ibm-tools-5.4.0-1086", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-ibm-tools-common", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-image-unsigned-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-image-unsigned-5.4.0-1086-ibm-dbgsym", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-modules-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-modules-extra-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91" }, { "binary_name": "linux-tools-5.4.0-1086-ibm", "binary_version": "5.4.0-1086.91" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-ibm-5.15-headers-5.15.0-1066", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-ibm-5.15-source-5.15.0", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-ibm-5.15-tools-5.15.0-1066", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1066-ibm-dbgsym", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-intel-iotg-dbgsym", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1071", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-common", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1071", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1071", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-common", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-host", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1048-iot", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-headers-5.4.0-1048-iot", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-image-5.4.0-1048-iot", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-image-5.4.0-1048-iot-dbgsym", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-image-unsigned-5.4.0-1048-iot", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-image-unsigned-5.4.0-1048-iot-dbgsym", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-iot-headers-5.4.0-1048", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-iot-tools-5.4.0-1048", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-modules-5.4.0-1048-iot", "binary_version": "5.4.0-1048.51" }, { "binary_name": "linux-tools-5.4.0-1048-iot", "binary_version": "5.4.0-1048.51" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1127-kvm", "binary_version": "5.4.0-1127.136" }, { "binary_name": "linux-headers-5.4.0-1127-kvm", "binary_version": "5.4.0-1127.136" }, { "binary_name": "linux-image-unsigned-5.4.0-1127-kvm", "binary_version": "5.4.0-1127.136" }, { "binary_name": "linux-image-unsigned-5.4.0-1127-kvm-dbgsym", "binary_version": "5.4.0-1127.136" }, { "binary_name": "linux-kvm-headers-5.4.0-1127", "binary_version": "5.4.0-1127.136" }, { "binary_name": "linux-kvm-tools-5.4.0-1127", "binary_version": "5.4.0-1127.136" }, { "binary_name": "linux-modules-5.4.0-1127-kvm", "binary_version": "5.4.0-1127.136" }, { "binary_name": "linux-tools-5.4.0-1127-kvm", "binary_version": "5.4.0-1127.136" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-headers-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-headers-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency-64k-dbgsym", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency-dbgsym", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-127", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-127", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-127", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-tools-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137~20.04.1" }, { "binary_name": "linux-tools-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra-dbgsym", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra-rt-dbgsym", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1032", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1032", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-headers-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-image-unsigned-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-image-unsigned-5.4.0-1138-oracle-dbgsym", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-modules-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-modules-extra-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-oracle-headers-5.4.0-1138", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-oracle-tools-5.4.0-1138", "binary_version": "5.4.0-1138.147" }, { "binary_name": "linux-tools-5.4.0-1138-oracle", "binary_version": "5.4.0-1138.147" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-oracle-dbgsym", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-oracle-5.15-headers-5.15.0-1071", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-oracle-5.15-tools-5.15.0-1071", "binary_version": "5.15.0-1071.77~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142" }, { "binary_name": "linux-headers-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142" }, { "binary_name": "linux-image-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142" }, { "binary_name": "linux-image-5.4.0-1129-raspi-dbgsym", "binary_version": "5.4.0-1129.142" }, { "binary_name": "linux-modules-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142" }, { "binary_name": "linux-raspi-headers-5.4.0-1129", "binary_version": "5.4.0-1129.142" }, { "binary_name": "linux-raspi-tools-5.4.0-1129", "binary_version": "5.4.0-1129.142" }, { "binary_name": "linux-tools-5.4.0-1129-raspi", "binary_version": "5.4.0-1129.142" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1069-generic", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1069-generic", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-image-5.15.0-1069-generic", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-image-5.15.0-1069-generic-dbgsym", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1069-generic", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1069-generic", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-riscv-5.15-headers-5.15.0-1069", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-riscv-5.15-tools-5.15.0-1069", "binary_version": "5.15.0-1069.73~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1069-generic", "binary_version": "5.15.0-1069.73~20.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1058-xilinx-zynqmp", "binary_version": "5.4.0-1058.62" }, { "binary_name": "linux-headers-5.4.0-1058-xilinx-zynqmp", "binary_version": "5.4.0-1058.62" }, { "binary_name": "linux-image-5.4.0-1058-xilinx-zynqmp", "binary_version": "5.4.0-1058.62" }, { "binary_name": "linux-image-5.4.0-1058-xilinx-zynqmp-dbgsym", "binary_version": "5.4.0-1058.62" }, { "binary_name": "linux-modules-5.4.0-1058-xilinx-zynqmp", "binary_version": "5.4.0-1058.62" }, { "binary_name": "linux-tools-5.4.0-1058-xilinx-zynqmp", "binary_version": "5.4.0-1058.62" }, { "binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1058", "binary_version": "5.4.0-1058.62" }, { "binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1058", "binary_version": "5.4.0-1058.62" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-fips-headers-5.4.0-1140", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-aws-fips-tools-5.4.0-1140", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-buildinfo-5.4.0-1140-aws-fips", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-headers-5.4.0-1140-aws-fips", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-image-unsigned-5.4.0-1140-aws-fips", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-image-unsigned-5.4.0-1140-aws-fips-dbgsym", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.4.0-1140-aws-fips", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-modules-5.4.0-1140-aws-fips", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-modules-extra-5.4.0-1140-aws-fips", "binary_version": "5.4.0-1140.151+fips1" }, { "binary_name": "linux-tools-5.4.0-1140-aws-fips", "binary_version": "5.4.0-1140.151+fips1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-5.4.0-1145", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-azure-fips-headers-5.4.0-1145", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-azure-fips-tools-5.4.0-1145", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-buildinfo-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-cloud-tools-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-headers-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-image-unsigned-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-image-unsigned-5.4.0-1145-azure-fips-dbgsym", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-modules-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-modules-extra-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" }, { "binary_name": "linux-tools-5.4.0-1145-azure-fips", "binary_version": "5.4.0-1145.152+fips1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1116-fips", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-fips-headers-5.4.0-1116", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-fips-tools-5.4.0-1116", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-fips-tools-host", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-headers-5.4.0-1116-fips", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-image-unsigned-5.4.0-1116-fips", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-image-unsigned-5.4.0-1116-fips-dbgsym", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-image-unsigned-hmac-5.4.0-1116-fips", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-modules-5.4.0-1116-fips", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-modules-extra-5.4.0-1116-fips", "binary_version": "5.4.0-1116.126" }, { "binary_name": "linux-tools-5.4.0-1116-fips", "binary_version": "5.4.0-1116.126" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.4.0-1143-gcp-fips", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-gcp-fips-headers-5.4.0-1143", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-gcp-fips-tools-5.4.0-1143", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-headers-5.4.0-1143-gcp-fips", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-image-unsigned-5.4.0-1143-gcp-fips", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-image-unsigned-5.4.0-1143-gcp-fips-dbgsym", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.4.0-1143-gcp-fips", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-modules-5.4.0-1143-gcp-fips", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-modules-extra-5.4.0-1143-gcp-fips", "binary_version": "5.4.0-1143.152+fips1" }, { "binary_name": "linux-tools-5.4.0-1143-gcp-fips", "binary_version": "5.4.0-1143.152+fips1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-buildinfo-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-buildinfo-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-cloud-tools-5.15.0-127", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-cloud-tools-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-doc", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-headers-5.15.0-127", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-headers-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-headers-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-headers-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-5.15.0-127-generic-dbgsym", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-5.15.0-127-generic-lpae-dbgsym", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic-64k-dbgsym", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-generic-dbgsym", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-libc-dev", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-extra-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-source-5.15.0", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-5.15.0-127", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-5.15.0-127-generic", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-5.15.0-127-generic-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-5.15.0-127-generic-lpae", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-common", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-host", "binary_version": "5.15.0-127.137" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-5.15.0-1073", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-aws-headers-5.15.0-1073", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-aws-tools-5.15.0-1073", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-buildinfo-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-cloud-tools-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-headers-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-aws-dbgsym", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-modules-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-modules-extra-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79" }, { "binary_name": "linux-tools-5.15.0-1073-aws", "binary_version": "5.15.0-1073.79" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-aws-6.8-headers-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-aws-6.8-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-5.15.0-1078", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-azure-headers-5.15.0-1078", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-azure-tools-5.15.0-1078", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-buildinfo-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-cloud-tools-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-headers-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-image-unsigned-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-image-unsigned-5.15.0-1078-azure-dbgsym", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-modules-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-modules-extra-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-modules-involflt-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" }, { "binary_name": "linux-tools-5.15.0-1078-azure", "binary_version": "5.15.0-1078.87" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-azure-6.8-headers-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-azure-6.8-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-involflt-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-gcp-headers-5.15.0-1072", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-gcp-tools-5.15.0-1072", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-headers-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-gcp-dbgsym", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-modules-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-modules-extra-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80" }, { "binary_name": "linux-tools-5.15.0-1072-gcp", "binary_version": "5.15.0-1072.80" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-gcp-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-gcp-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1070-gke", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-gke-headers-5.15.0-1070", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-gke-tools-5.15.0-1070", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-headers-5.15.0-1070-gke", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-image-unsigned-5.15.0-1070-gke", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-image-unsigned-5.15.0-1070-gke-dbgsym", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-modules-5.15.0-1070-gke", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-modules-extra-5.15.0-1070-gke", "binary_version": "5.15.0-1070.76" }, { "binary_name": "linux-tools-5.15.0-1070-gke", "binary_version": "5.15.0-1070.76" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1056-gkeop", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-cloud-tools-5.15.0-1056-gkeop", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-gkeop-cloud-tools-5.15.0-1056", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-gkeop-headers-5.15.0-1056", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-gkeop-tools-5.15.0-1056", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-headers-5.15.0-1056-gkeop", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-image-unsigned-5.15.0-1056-gkeop", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-image-unsigned-5.15.0-1056-gkeop-dbgsym", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-modules-5.15.0-1056-gkeop", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-modules-extra-5.15.0-1056-gkeop", "binary_version": "5.15.0-1056.63" }, { "binary_name": "linux-tools-5.15.0-1056-gkeop", "binary_version": "5.15.0-1056.63" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-headers-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-headers-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-headers-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-tools-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-6.8.0-57-generic-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-ipu6-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-usbio-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-tools-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-tools-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-headers-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-ibm-cloud-tools-common", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-ibm-headers-5.15.0-1066", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-ibm-source-5.15.0", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-ibm-tools-5.15.0-1066", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-ibm-tools-common", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-image-unsigned-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-image-unsigned-5.15.0-1066-ibm-dbgsym", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-modules-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-modules-extra-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-tools-5.15.0-1066-ibm", "binary_version": "5.15.0-1066.69" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-ibm-6.8-headers-6.8.0-1023", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-ibm-6.8-tools-6.8.0-1023", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-ibm-dbgsym", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-cloud-tools-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-headers-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-intel-iotg-dbgsym", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1071", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-intel-iotg-cloud-tools-common", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-intel-iotg-headers-5.15.0-1071", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-intel-iotg-tools-5.15.0-1071", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-intel-iotg-tools-common", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-intel-iotg-tools-host", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-modules-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-modules-extra-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-tools-5.15.0-1071-intel-iotg", "binary_version": "5.15.0-1071.77" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1070-kvm", "binary_version": "5.15.0-1070.75" }, { "binary_name": "linux-headers-5.15.0-1070-kvm", "binary_version": "5.15.0-1070.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1070-kvm", "binary_version": "5.15.0-1070.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1070-kvm-dbgsym", "binary_version": "5.15.0-1070.75" }, { "binary_name": "linux-kvm-headers-5.15.0-1070", "binary_version": "5.15.0-1070.75" }, { "binary_name": "linux-kvm-tools-5.15.0-1070", "binary_version": "5.15.0-1070.75" }, { "binary_name": "linux-modules-5.15.0-1070-kvm", "binary_version": "5.15.0-1070.75" }, { "binary_name": "linux-tools-5.15.0-1070-kvm", "binary_version": "5.15.0-1070.75" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-buildinfo-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-cloud-tools-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-headers-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-headers-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency-64k-dbgsym", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-image-unsigned-5.15.0-127-lowlatency-dbgsym", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-lowlatency-cloud-tools-5.15.0-127", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-lowlatency-headers-5.15.0-127", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-lowlatency-tools-5.15.0-127", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-5.15.0-127-lowlatency", "binary_version": "5.15.0-127.137" }, { "binary_name": "linux-tools-5.15.0-127-lowlatency-64k", "binary_version": "5.15.0-127.137" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-buildinfo-5.15.0-1068-nvidia-lowlatency", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-cloud-tools-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-cloud-tools-5.15.0-1068-nvidia-lowlatency", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-headers-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-headers-5.15.0-1068-nvidia-lowlatency", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-image-unsigned-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-image-unsigned-5.15.0-1068-nvidia-dbgsym", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-image-unsigned-5.15.0-1068-nvidia-lowlatency", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-image-unsigned-5.15.0-1068-nvidia-lowlatency-dbgsym", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-modules-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-modules-5.15.0-1068-nvidia-lowlatency", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-modules-extra-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-modules-nvidia-fs-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-modules-nvidia-fs-5.15.0-1068-nvidia-lowlatency", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-nvidia-cloud-tools-5.15.0-1068", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-nvidia-cloud-tools-common", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-nvidia-headers-5.15.0-1068", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-nvidia-tools-5.15.0-1068", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-nvidia-tools-common", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-nvidia-tools-host", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-tools-5.15.0-1068-nvidia", "binary_version": "5.15.0-1068.69" }, { "binary_name": "linux-tools-5.15.0-1068-nvidia-lowlatency", "binary_version": "5.15.0-1068.69" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-nvidia-6.8-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-nvidia-6.8-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-buildinfo-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-headers-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-headers-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra-dbgsym", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-image-unsigned-5.15.0-1032-nvidia-tegra-rt-dbgsym", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-modules-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-modules-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-modules-extra-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-nvidia-tegra-headers-5.15.0-1032", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-nvidia-tegra-tools-5.15.0-1032", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-tools-5.15.0-1032-nvidia-tegra", "binary_version": "5.15.0-1032.32" }, { "binary_name": "linux-tools-5.15.0-1032-nvidia-tegra-rt", "binary_version": "5.15.0-1032.32" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1020-nvidia-tegra-igx", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-buildinfo-5.15.0-1020-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-headers-5.15.0-1020-nvidia-tegra-igx", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-headers-5.15.0-1020-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-image-unsigned-5.15.0-1020-nvidia-tegra-igx", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-image-unsigned-5.15.0-1020-nvidia-tegra-igx-dbgsym", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-image-unsigned-5.15.0-1020-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-image-unsigned-5.15.0-1020-nvidia-tegra-igx-rt-dbgsym", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-modules-5.15.0-1020-nvidia-tegra-igx", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-modules-5.15.0-1020-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-modules-extra-5.15.0-1020-nvidia-tegra-igx", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1020", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1020", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-tools-5.15.0-1020-nvidia-tegra-igx", "binary_version": "5.15.0-1020.20" }, { "binary_name": "linux-tools-5.15.0-1020-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1020.20" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-headers-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-image-unsigned-5.15.0-1071-oracle-dbgsym", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-modules-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-modules-extra-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-oracle-headers-5.15.0-1071", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-oracle-tools-5.15.0-1071", "binary_version": "5.15.0-1071.77" }, { "binary_name": "linux-tools-5.15.0-1071-oracle", "binary_version": "5.15.0-1071.77" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-oracle-6.8-headers-6.8.0-1020", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-oracle-6.8-tools-6.8.0-1020", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1066-raspi", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-headers-5.15.0-1066-raspi", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-image-5.15.0-1066-raspi", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-image-5.15.0-1066-raspi-dbgsym", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-modules-5.15.0-1066-raspi", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-modules-extra-5.15.0-1066-raspi", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-raspi-headers-5.15.0-1066", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-raspi-tools-5.15.0-1066", "binary_version": "5.15.0-1066.69" }, { "binary_name": "linux-tools-5.15.0-1066-raspi", "binary_version": "5.15.0-1066.69" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-53-generic-dbgsym", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-headers-6.8.0-53", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-tools-6.8.0-53", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1039-xilinx-zynqmp", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-headers-5.15.0-1039-xilinx-zynqmp", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-image-5.15.0-1039-xilinx-zynqmp", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-image-5.15.0-1039-xilinx-zynqmp-dbgsym", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-modules-5.15.0-1039-xilinx-zynqmp", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-tools-5.15.0-1039-xilinx-zynqmp", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1039", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1039", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-xilinx-zynqmp-tools-common", "binary_version": "5.15.0-1039.43" }, { "binary_name": "linux-xilinx-zynqmp-tools-host", "binary_version": "5.15.0-1039.43" } ] }
{ "availability": "Available for NVIDIA BlueField platforms", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-bluefield-cloud-tools-common", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-bluefield-headers-5.15.0-1057", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-bluefield-tools-5.15.0-1057", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-bluefield-tools-host", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-buildinfo-5.15.0-1057-bluefield", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-headers-5.15.0-1057-bluefield", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-image-unsigned-5.15.0-1057-bluefield", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-image-unsigned-5.15.0-1057-bluefield-dbgsym", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-modules-5.15.0-1057-bluefield", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-modules-extra-5.15.0-1057-bluefield", "binary_version": "5.15.0-1057.59" }, { "binary_name": "linux-tools-5.15.0-1057-bluefield", "binary_version": "5.15.0-1057.59" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1073", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-aws-fips-headers-5.15.0-1073", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-aws-fips-tools-5.15.0-1073", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-headers-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-aws-fips-dbgsym", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-modules-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" }, { "binary_name": "linux-tools-5.15.0-1073-aws-fips", "binary_version": "5.15.0-1073.79+fips1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1078", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-azure-fips-headers-5.15.0-1078", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-azure-fips-tools-5.15.0-1078", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-headers-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1078-azure-fips-dbgsym", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-modules-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-modules-involflt-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" }, { "binary_name": "linux-tools-5.15.0-1078-azure-fips", "binary_version": "5.15.0-1078.87+fips1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-fips-headers-5.15.0-127", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-fips-tools-5.15.0-127", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-headers-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-127-fips-dbgsym", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-modules-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" }, { "binary_name": "linux-tools-5.15.0-127-fips", "binary_version": "5.15.0-127.137+fips1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1072-gcp-fips", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-gcp-fips-headers-5.15.0-1072", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-gcp-fips-tools-5.15.0-1072", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-headers-5.15.0-1072-gcp-fips", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-gcp-fips", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-gcp-fips-dbgsym", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1072-gcp-fips", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-modules-5.15.0-1072-gcp-fips", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1072-gcp-fips", "binary_version": "5.15.0-1072.80+fips1" }, { "binary_name": "linux-tools-5.15.0-1072-gcp-fips", "binary_version": "5.15.0-1072.80+fips1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1066-intel-iot-realtime", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-cloud-tools-5.15.0-1066-intel-iot-realtime", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-headers-5.15.0-1066-intel-iot-realtime", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-image-unsigned-5.15.0-1066-intel-iot-realtime", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-image-unsigned-5.15.0-1066-intel-iot-realtime-dbgsym", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1066", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-intel-iot-realtime-cloud-tools-common", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1066", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1066", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-intel-iot-realtime-tools-common", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-intel-iot-realtime-tools-host", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-modules-5.15.0-1066-intel-iot-realtime", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-modules-extra-5.15.0-1066-intel-iot-realtime", "binary_version": "5.15.0-1066.68" }, { "binary_name": "linux-tools-5.15.0-1066-intel-iot-realtime", "binary_version": "5.15.0-1066.68" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-cloud-tools-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-headers-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-realtime-dbgsym", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-modules-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-modules-extra-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-realtime-cloud-tools-5.15.0-1074", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-realtime-cloud-tools-common", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-realtime-headers-5.15.0-1074", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-realtime-tools-5.15.0-1074", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-realtime-tools-common", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-realtime-tools-host", "binary_version": "5.15.0-1074.82" }, { "binary_name": "linux-tools-5.15.0-1074-realtime", "binary_version": "5.15.0-1074.82" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-buildinfo-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-buildinfo-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-doc", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-6.8.0-54-generic-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-lib-rust-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-libc-dev", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-extra-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-ipu6-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-usbio-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-source-6.8.0", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-common", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-host", "binary_version": "6.8.0-54.56" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-aws-headers-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-aws-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-buildinfo-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-cloud-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-headers-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-modules-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-modules-extra-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-azure-headers-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-azure-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-buildinfo-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-cloud-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-headers-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-extra-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-involflt-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-headers-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure-dbgsym", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-cloud-tools-common", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-headers-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-buildinfo-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-cloud-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-headers-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia-dbgsym", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-extra-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-gcp-headers-6.8.0-1024", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-gcp-tools-6.8.0-1024", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-headers-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-headers-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-tools-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-tools-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-headers-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-tools-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-gke-headers-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-gke-tools-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-headers-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-gke-dbgsym", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-extra-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-tools-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-cloud-tools-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-cloud-tools-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-headers-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-tools-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-headers-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop-dbgsym", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-modules-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-modules-extra-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-tools-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-headers-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-ibm-headers-6.8.0-1022", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-ibm-tools-6.8.0-1022", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-ibm-dbgsym", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-extra-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-tools-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-headers-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-lib-rust-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-nvidia-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-nvidia-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k-dbgsym", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-dbgsym", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-headers-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem-dbgsym", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu6-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu7-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-usbio-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-vision-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-headers-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-tools-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-tools-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-headers-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oem-dbgsym", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-ipu6-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-usbio-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-oem-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-oem-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-tools-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-headers-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-headers-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-oracle-headers-6.8.0-1020", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-oracle-tools-6.8.0-1020", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-tools-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-tools-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-headers-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-6.8.0-1019-raspi-dbgsym", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-raspi-headers-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-raspi-tools-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-tools-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-headers-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-image-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-image-6.8.0-53-generic-dbgsym", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-modules-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-riscv-headers-6.8.0-53", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-riscv-tools-6.8.0-53", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-tools-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-headers-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-image-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-image-6.8.0-2018-raspi-realtime-dbgsym", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-modules-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-raspi-realtime-headers-6.8.0-2018", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-raspi-realtime-tools-6.8.0-2018", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-tools-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability requires to win a race condition and to have CAP_SYS_ADMIN privileges (umount opertaion) to be exploited.", "binaries": [ { "binary_name": "linux-buildinfo-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-cloud-tools-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-headers-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-image-unsigned-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-image-unsigned-6.8.1-1016-realtime-dbgsym", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-extra-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-iwlwifi-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-cloud-tools-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-headers-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-tools-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-tools-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" } ] }