In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2capconnect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hcirxwork Call Trace: <TASK> _dumpstack lib/dumpstack.c:93 [inline] dumpstacklvl+0x116/0x1f0 lib/dumpstack.c:119 printaddressdescription mm/kasan/report.c:377 [inline] printreport+0xc3/0x620 mm/kasan/report.c:488 kasanreport+0xd9/0x110 mm/kasan/report.c:601 l2capconnect.constprop.0+0x10d8/0x1270 net/bluetooth/l2capcore.c:3949 l2capconnectreq net/bluetooth/l2capcore.c:4080 [inline] l2capbredrsigcmd net/bluetooth/l2capcore.c:4772 [inline] l2capsigchannel net/bluetooth/l2capcore.c:5543 [inline] l2caprecvframe+0xf0b/0x8eb0 net/bluetooth/l2capcore.c:6825 l2caprecvacldata+0x9b4/0xb70 net/bluetooth/l2capcore.c:7514 hciacldatapacket net/bluetooth/hcicore.c:3791 [inline] hcirxwork+0xaab/0x1610 net/bluetooth/hcicore.c:4028 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244 ... Freed by task 5245: kasansavestack+0x33/0x60 mm/kasan/common.c:47 kasansavetrack+0x14/0x30 mm/kasan/common.c:68 kasansavefreeinfo+0x3b/0x60 mm/kasan/generic.c:579 poisonslabobject+0xf7/0x160 mm/kasan/common.c:240 _kasanslabfree+0x32/0x50 mm/kasan/common.c:256 kasanslabfree include/linux/kasan.h:184 [inline] slabfreehook mm/slub.c:2256 [inline] slabfree mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2capconnfree net/bluetooth/l2capcore.c:1810 [inline] krefput include/linux/kref.h:65 [inline] l2capconnput net/bluetooth/l2capcore.c:1822 [inline] l2capconndel+0x59d/0x730 net/bluetooth/l2capcore.c:1802 l2capconnectcfm+0x9e6/0xf80 net/bluetooth/l2capcore.c:7241 hciconnectcfm include/net/bluetooth/hcicore.h:1960 [inline] hciconnfailed+0x1c3/0x370 net/bluetooth/hciconn.c:1265 hciabortconnsync+0x75a/0xb50 net/bluetooth/hcisync.c:5583 abortconnsync+0x197/0x360 net/bluetooth/hciconn.c:2917 hcicmdsyncwork+0x1a4/0x410 net/bluetooth/hcisync.c:328 processonework+0x9c5/0x1b40 kernel/workqueue.c:3231 processscheduledworks kernel/workqueue.c:3312 [inline] workerthread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 retfromfork+0x45/0x80 arch/x86/kernel/process.c:147 retfromforkasm+0x1a/0x30 arch/x86/entry/entry64.S:244
{ "binaries": [ { "binary_name": "linux-aws-cloud-tools-4.4.0-1146", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-aws-headers-4.4.0-1146", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-aws-tools-4.4.0-1146", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-buildinfo-4.4.0-1146-aws", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-cloud-tools-4.4.0-1146-aws", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-headers-4.4.0-1146-aws", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-image-4.4.0-1146-aws", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-image-4.4.0-1146-aws-dbgsym", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-modules-4.4.0-1146-aws", "binary_version": "4.4.0-1146.152" }, { "binary_name": "linux-tools-4.4.0-1146-aws", "binary_version": "4.4.0-1146.152" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-cloud-tools-4.15.0-1191", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-azure-headers-4.15.0-1191", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-azure-tools-4.15.0-1191", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-buildinfo-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-cloud-tools-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-headers-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-modules-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~14.04.1" }, { "binary_name": "linux-tools-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~14.04.1" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "block-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "crypto-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "fat-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "fb-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "firewire-core-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "floppy-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "fs-core-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "fs-secondary-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "input-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "ipmi-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "irda-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "kernel-image-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-buildinfo-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-buildinfo-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-cloud-tools-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-cloud-tools-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-headers-4.4.0-271", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-headers-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-headers-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-image-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-image-4.4.0-271-generic-dbgsym", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-image-unsigned-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-image-unsigned-4.4.0-271-generic-dbgsym", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency-dbgsym", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-271", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-lts-xenial-tools-4.4.0-271", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-lts-xenial-udebs-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-modules-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-modules-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-modules-extra-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-tools-4.4.0-271-generic", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "linux-tools-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "md-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "message-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "mouse-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "multipath-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "nfs-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "nic-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "nic-pcmcia-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "nic-shared-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "nic-usb-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "parport-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "pata-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "pcmcia-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "pcmcia-storage-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "plip-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "ppp-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "sata-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "scsi-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "serial-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "speakup-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "storage-core-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "usb-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "virtio-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" }, { "binary_name": "vlan-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305~14.04.1" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "block-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "crypto-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "dasd-extra-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "dasd-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "fat-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "fb-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "firewire-core-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "floppy-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "fs-core-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "fs-secondary-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "input-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "ipmi-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "irda-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "kernel-image-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-buildinfo-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-buildinfo-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-cloud-tools-4.4.0-271", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-cloud-tools-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-cloud-tools-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-doc", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-headers-4.4.0-271", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-headers-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-headers-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-image-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-image-4.4.0-271-generic-dbgsym", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-image-unsigned-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-image-unsigned-4.4.0-271-generic-dbgsym", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-image-unsigned-4.4.0-271-lowlatency-dbgsym", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-libc-dev", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-modules-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-modules-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-modules-extra-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-source-4.4.0", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-tools-4.4.0-271", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-tools-4.4.0-271-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-tools-4.4.0-271-lowlatency", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-tools-common", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-tools-host", "binary_version": "4.4.0-271.305" }, { "binary_name": "linux-udebs-generic", "binary_version": "4.4.0-271.305" }, { "binary_name": "md-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "message-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "mouse-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "multipath-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "nfs-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "nic-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "nic-pcmcia-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "nic-shared-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "nic-usb-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "parport-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "pata-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "pcmcia-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "pcmcia-storage-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "plip-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "ppp-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "sata-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "scsi-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "serial-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "speakup-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "storage-core-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "usb-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "virtio-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" }, { "binary_name": "vlan-modules-4.4.0-271-generic-di", "binary_version": "4.4.0-271.305" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-cloud-tools-4.4.0-1184", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-aws-headers-4.4.0-1184", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-aws-tools-4.4.0-1184", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-buildinfo-4.4.0-1184-aws", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-cloud-tools-4.4.0-1184-aws", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-headers-4.4.0-1184-aws", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-image-4.4.0-1184-aws", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-image-4.4.0-1184-aws-dbgsym", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-modules-4.4.0-1184-aws", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-modules-extra-4.4.0-1184-aws", "binary_version": "4.4.0-1184.199" }, { "binary_name": "linux-tools-4.4.0-1184-aws", "binary_version": "4.4.0-1184.199" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-headers-4.15.0-1183", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1183", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-aws-hwe-tools-4.15.0-1183", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-buildinfo-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-cloud-tools-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-headers-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1183-aws-dbgsym", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-modules-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196~16.04.1" }, { "binary_name": "linux-tools-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196~16.04.1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-cloud-tools-4.15.0-1191", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-azure-headers-4.15.0-1191", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-azure-tools-4.15.0-1191", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-buildinfo-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-cloud-tools-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-headers-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-modules-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~16.04.1" }, { "binary_name": "linux-tools-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206~16.04.1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-gcp-headers-4.15.0-1176", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-gcp-tools-4.15.0-1176", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-headers-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1176-gcp-dbgsym", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-modules-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193~16.04.1" }, { "binary_name": "linux-tools-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193~16.04.1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "block-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "crypto-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "dasd-extra-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "dasd-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "fat-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "fb-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "firewire-core-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "floppy-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "fs-core-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "fs-secondary-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "input-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "ipmi-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "irda-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "kernel-image-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-buildinfo-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-buildinfo-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-cloud-tools-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-cloud-tools-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-headers-4.15.0-240", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-headers-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-headers-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-hwe-cloud-tools-4.15.0-240", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-hwe-tools-4.15.0-240", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-hwe-udebs-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-image-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-image-4.15.0-240-generic-dbgsym", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-240-generic-dbgsym", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency-dbgsym", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-modules-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-modules-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-tools-4.15.0-240-generic", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "linux-tools-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "md-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "message-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "mouse-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "multipath-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "nfs-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "nic-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "nic-shared-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "nic-usb-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "parport-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "pata-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "pcmcia-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "plip-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "ppp-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "sata-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "scsi-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "serial-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "storage-core-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "usb-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "virtio-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" }, { "binary_name": "vlan-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252~16.04.1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.4.0-1147-kvm", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-cloud-tools-4.4.0-1147-kvm", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-headers-4.4.0-1147-kvm", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-image-4.4.0-1147-kvm", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-image-4.4.0-1147-kvm-dbgsym", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-kvm-cloud-tools-4.4.0-1147", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-kvm-headers-4.4.0-1147", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-kvm-tools-4.4.0-1147", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-modules-4.4.0-1147-kvm", "binary_version": "4.4.0-1147.158" }, { "binary_name": "linux-tools-4.4.0-1147-kvm", "binary_version": "4.4.0-1147.158" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-headers-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-image-unsigned-4.15.0-1145-oracle-dbgsym", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-modules-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-modules-extra-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-oracle-headers-4.15.0-1145", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-oracle-tools-4.15.0-1145", "binary_version": "4.15.0-1145.156~16.04.1" }, { "binary_name": "linux-tools-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156~16.04.1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "block-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "crypto-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "dasd-extra-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "dasd-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "fat-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "fb-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "firewire-core-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "floppy-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "fs-core-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "fs-secondary-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "input-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "ipmi-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "irda-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "kernel-image-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-buildinfo-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-fips-cloud-tools-common", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-fips-headers-4.4.0-1116", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-fips-source-4.4.0", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-fips-tools-4.4.0-1116", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-headers-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-image-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-image-4.4.0-1116-fips-dbgsym", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-image-hmac-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-image-unsigned-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-image-unsigned-4.4.0-1116-fips-dbgsym", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-image-unsigned-hmac-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-modules-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-modules-extra-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-tools-4.4.0-1116-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "linux-udebs-fips", "binary_version": "4.4.0-1116.123" }, { "binary_name": "md-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "message-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "mouse-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "multipath-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "nfs-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "nic-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "nic-pcmcia-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "nic-shared-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "nic-usb-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "parport-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "pata-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "pcmcia-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "pcmcia-storage-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "plip-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "ppp-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "sata-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "scsi-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "serial-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "speakup-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "storage-core-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "usb-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "virtio-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" }, { "binary_name": "vlan-modules-4.4.0-1116-fips-di", "binary_version": "4.4.0-1116.123" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "block-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "crypto-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "dasd-extra-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "dasd-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "fat-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "fb-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "firewire-core-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "floppy-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "fs-core-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "fs-secondary-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "input-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "ipmi-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "irda-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "kernel-image-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-buildinfo-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-buildinfo-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-cloud-tools-4.15.0-240", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-cloud-tools-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-cloud-tools-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-doc", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-headers-4.15.0-240", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-headers-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-headers-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-image-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-image-4.15.0-240-generic-dbgsym", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-image-unsigned-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-image-unsigned-4.15.0-240-generic-dbgsym", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency-dbgsym", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-libc-dev", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-modules-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-modules-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-modules-extra-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-source-4.15.0", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-tools-4.15.0-240", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-tools-4.15.0-240-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-tools-4.15.0-240-lowlatency", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-tools-common", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-tools-host", "binary_version": "4.15.0-240.252" }, { "binary_name": "linux-udebs-generic", "binary_version": "4.15.0-240.252" }, { "binary_name": "md-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "message-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "mouse-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "multipath-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "nfs-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "nic-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "nic-shared-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "nic-usb-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "parport-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "pata-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "pcmcia-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "plip-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "ppp-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "sata-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "scsi-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "serial-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "storage-core-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "usb-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "virtio-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" }, { "binary_name": "vlan-modules-4.15.0-240-generic-di", "binary_version": "4.15.0-240.252" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-cloud-tools-4.15.0-1183", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-aws-headers-4.15.0-1183", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-aws-tools-4.15.0-1183", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-buildinfo-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-cloud-tools-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-headers-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-image-unsigned-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-image-unsigned-4.15.0-1183-aws-dbgsym", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-modules-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-modules-extra-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196" }, { "binary_name": "linux-tools-4.15.0-1183-aws", "binary_version": "4.15.0-1183.196" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1191", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-azure-4.15-headers-4.15.0-1191", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-azure-4.15-tools-4.15.0-1191", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-buildinfo-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-cloud-tools-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-headers-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-image-unsigned-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-modules-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-modules-extra-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206" }, { "binary_name": "linux-tools-4.15.0-1191-azure", "binary_version": "4.15.0-1191.206" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-gcp-4.15-headers-4.15.0-1176", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-gcp-4.15-tools-4.15.0-1176", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-headers-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-image-unsigned-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-image-unsigned-4.15.0-1176-gcp-dbgsym", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-modules-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-modules-extra-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193" }, { "binary_name": "linux-tools-4.15.0-1176-gcp", "binary_version": "4.15.0-1176.193" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1166-kvm", "binary_version": "4.15.0-1166.171" }, { "binary_name": "linux-headers-4.15.0-1166-kvm", "binary_version": "4.15.0-1166.171" }, { "binary_name": "linux-image-4.15.0-1166-kvm", "binary_version": "4.15.0-1166.171" }, { "binary_name": "linux-image-4.15.0-1166-kvm-dbgsym", "binary_version": "4.15.0-1166.171" }, { "binary_name": "linux-kvm-headers-4.15.0-1166", "binary_version": "4.15.0-1166.171" }, { "binary_name": "linux-kvm-tools-4.15.0-1166", "binary_version": "4.15.0-1166.171" }, { "binary_name": "linux-modules-4.15.0-1166-kvm", "binary_version": "4.15.0-1166.171" }, { "binary_name": "linux-tools-4.15.0-1166-kvm", "binary_version": "4.15.0-1166.171" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-headers-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-image-unsigned-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-image-unsigned-4.15.0-1145-oracle-dbgsym", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-modules-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-modules-extra-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-oracle-headers-4.15.0-1145", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-oracle-tools-4.15.0-1145", "binary_version": "4.15.0-1145.156" }, { "binary_name": "linux-tools-4.15.0-1145-oracle", "binary_version": "4.15.0-1145.156" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-fips-headers-4.15.0-2121", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-aws-fips-tools-4.15.0-2121", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-buildinfo-4.15.0-2121-aws-fips", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-headers-4.15.0-2121-aws-fips", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-image-unsigned-4.15.0-2121-aws-fips", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-image-unsigned-4.15.0-2121-aws-fips-dbgsym", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-2121-aws-fips", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-modules-4.15.0-2121-aws-fips", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-modules-extra-4.15.0-2121-aws-fips", "binary_version": "4.15.0-2121.127" }, { "binary_name": "linux-tools-4.15.0-2121-aws-fips", "binary_version": "4.15.0-2121.127" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-4.15.0-2100", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-azure-fips-headers-4.15.0-2100", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-azure-fips-tools-4.15.0-2100", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-buildinfo-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-cloud-tools-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-headers-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-image-unsigned-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-image-unsigned-4.15.0-2100-azure-fips-dbgsym", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-modules-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-modules-extra-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" }, { "binary_name": "linux-tools-4.15.0-2100-azure-fips", "binary_version": "4.15.0-2100.106" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-fips-headers-4.15.0-1138", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-fips-tools-4.15.0-1138", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-fips-tools-host", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-headers-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-image-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-image-4.15.0-1138-fips-dbgsym", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-image-hmac-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-image-unsigned-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-image-unsigned-4.15.0-1138-fips-dbgsym", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-modules-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-modules-extra-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" }, { "binary_name": "linux-tools-4.15.0-1138-fips", "binary_version": "4.15.0-1138.149" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-4.15.0-2084-gcp-fips", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-gcp-fips-headers-4.15.0-2084", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-gcp-fips-tools-4.15.0-2084", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-headers-4.15.0-2084-gcp-fips", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-image-unsigned-4.15.0-2084-gcp-fips", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-image-unsigned-4.15.0-2084-gcp-fips-dbgsym", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-image-unsigned-hmac-4.15.0-2084-gcp-fips", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-modules-4.15.0-2084-gcp-fips", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-modules-extra-4.15.0-2084-gcp-fips", "binary_version": "4.15.0-2084.90" }, { "binary_name": "linux-tools-4.15.0-2084-gcp-fips", "binary_version": "4.15.0-2084.90" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-aws-5.15-headers-5.15.0-1080", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-aws-5.15-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-dbgsym", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1086", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-azure-5.15-headers-5.15.0-1086", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-azure-5.15-tools-5.15.0-1086", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1086-azure-dbgsym", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-modules-involflt-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1086-azure", "binary_version": "5.15.0-1086.95~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-gcp-5.15-headers-5.15.0-1081", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-gcp-5.15-tools-5.15.0-1081", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1081-gcp-dbgsym", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1081-gcp", "binary_version": "5.15.0-1081.90~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-headers-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-headers-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-headers-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-136", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-hwe-5.15-headers-5.15.0-136", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-hwe-5.15-tools-5.15.0-136", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-5.15.0-136-generic-lpae-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic-64k-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-136-generic-dbgsym", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-tools-5.15.0-136-generic", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-tools-5.15.0-136-generic-64k", "binary_version": "5.15.0-136.147~20.04.1" }, { "binary_name": "linux-tools-5.15.0-136-generic-lpae", "binary_version": "5.15.0-136.147~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-ibm-5.15-headers-5.15.0-1074", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-ibm-5.15-source-5.15.0", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-ibm-5.15-tools-5.15.0-1074", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-ibm-dbgsym", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1074-ibm", "binary_version": "5.15.0-1074.77~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-intel-iotg-dbgsym", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-common", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-common", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-host", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1077-intel-iotg", "binary_version": "5.15.0-1077.83~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k-dbgsym", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-dbgsym", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-135", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-135", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-135", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146~20.04.1" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle-dbgsym", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-oracle-5.15-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-oracle-5.15-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-image-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-image-5.15.0-1075-generic-dbgsym", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-riscv-5.15-headers-5.15.0-1075", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-riscv-5.15-tools-5.15.0-1075", "binary_version": "5.15.0-1075.79~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1075-generic", "binary_version": "5.15.0-1075.79~20.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-buildinfo-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-dbgsym", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1039-nvidia-tegra-rt-dbgsym", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1039", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1039", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1039-nvidia-tegra", "binary_version": "5.15.0-1039.39~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1039-nvidia-tegra-rt", "binary_version": "5.15.0-1039.39~20.04.1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-buildinfo-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-buildinfo-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-doc", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-5.15.0-135-generic-lpae-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic-64k-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-generic-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-libc-dev", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-extra-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-source-5.15.0", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-generic", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-generic-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-generic-lpae", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-common", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-host", "binary_version": "5.15.0-135.146" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-aws-headers-5.15.0-1080", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-aws-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-buildinfo-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-headers-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-dbgsym", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-modules-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-modules-extra-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" }, { "binary_name": "linux-tools-5.15.0-1080-aws", "binary_version": "5.15.0-1080.87" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-aws-6.8-headers-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-aws-6.8-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-cloud-tools-5.15.0-1084", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-azure-headers-5.15.0-1084", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-azure-tools-5.15.0-1084", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-buildinfo-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-cloud-tools-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-headers-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-image-unsigned-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-image-unsigned-5.15.0-1084-azure-dbgsym", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-modules-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-modules-extra-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-modules-involflt-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" }, { "binary_name": "linux-tools-5.15.0-1084-azure", "binary_version": "5.15.0-1084.93" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-azure-6.8-headers-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-azure-6.8-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-involflt-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-gcp-headers-5.15.0-1079", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-gcp-tools-5.15.0-1079", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-headers-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-dbgsym", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-modules-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-modules-extra-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" }, { "binary_name": "linux-tools-5.15.0-1079-gcp", "binary_version": "5.15.0-1079.88" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-gcp-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-gcp-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-gke-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-gke-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-headers-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-gke-dbgsym", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-extra-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-tools-5.15.0-1077-gke", "binary_version": "5.15.0-1077.83" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-cloud-tools-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-gkeop-cloud-tools-5.15.0-1062", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-gkeop-headers-5.15.0-1062", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-gkeop-tools-5.15.0-1062", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-headers-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-gkeop-dbgsym", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-modules-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-modules-extra-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" }, { "binary_name": "linux-tools-5.15.0-1062-gkeop", "binary_version": "5.15.0-1062.70" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-headers-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-headers-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-headers-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-hwe-6.8-tools-6.8.0-57", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-6.8.0-57-generic-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-64k-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-57-generic-dbgsym", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-ipu6-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-modules-usbio-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-tools-6.8.0-57-generic", "binary_version": "6.8.0-57.59~22.04.1" }, { "binary_name": "linux-tools-6.8.0-57-generic-64k", "binary_version": "6.8.0-57.59~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-headers-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-cloud-tools-common", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-headers-5.15.0-1072", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-source-5.15.0", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-tools-5.15.0-1072", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-ibm-tools-common", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1072-ibm-dbgsym", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-modules-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-modules-extra-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" }, { "binary_name": "linux-tools-5.15.0-1072-ibm", "binary_version": "5.15.0-1072.75" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-ibm-6.8-headers-6.8.0-1023", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-ibm-6.8-tools-6.8.0-1023", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-ibm-dbgsym", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1023-ibm", "binary_version": "6.8.0-1023.23~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime-dbgsym", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-cloud-tools-common", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-tools-common", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-intel-iot-realtime-tools-host", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" }, { "binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime", "binary_version": "5.15.0-1073.75" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-cloud-tools-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-headers-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1075-intel-iotg-dbgsym", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1075", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-cloud-tools-common", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-headers-5.15.0-1075", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-tools-5.15.0-1075", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-tools-common", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-intel-iotg-tools-host", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-modules-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-modules-extra-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" }, { "binary_name": "linux-tools-5.15.0-1075-intel-iotg", "binary_version": "5.15.0-1075.81" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-headers-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-image-unsigned-5.15.0-1076-kvm-dbgsym", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-kvm-headers-5.15.0-1076", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-kvm-tools-5.15.0-1076", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-modules-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" }, { "binary_name": "linux-tools-5.15.0-1076-kvm", "binary_version": "5.15.0-1076.81" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-buildinfo-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-cloud-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-headers-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-64k-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-image-unsigned-5.15.0-135-lowlatency-dbgsym", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-lowlatency-cloud-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-lowlatency-headers-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-lowlatency-tools-5.15.0-135", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency", "binary_version": "5.15.0-135.146" }, { "binary_name": "linux-tools-5.15.0-135-lowlatency-64k", "binary_version": "5.15.0-135.146" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-buildinfo-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-cloud-tools-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-cloud-tools-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-headers-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-headers-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-dbgsym", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-image-unsigned-5.15.0-1074-nvidia-lowlatency-dbgsym", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-extra-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-modules-nvidia-fs-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-cloud-tools-5.15.0-1074", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-cloud-tools-common", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-headers-5.15.0-1074", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-tools-5.15.0-1074", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-tools-common", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-nvidia-tools-host", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-tools-5.15.0-1074-nvidia", "binary_version": "5.15.0-1074.75" }, { "binary_name": "linux-tools-5.15.0-1074-nvidia-lowlatency", "binary_version": "5.15.0-1074.75" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-nvidia-6.8-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-nvidia-6.8-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25~22.04.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25~22.04.2" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-buildinfo-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-headers-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-headers-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-dbgsym", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-image-unsigned-5.15.0-1033-nvidia-tegra-rt-dbgsym", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-modules-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-modules-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-modules-extra-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-nvidia-tegra-headers-5.15.0-1033", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-nvidia-tegra-tools-5.15.0-1033", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-tools-5.15.0-1033-nvidia-tegra", "binary_version": "5.15.0-1033.33" }, { "binary_name": "linux-tools-5.15.0-1033-nvidia-tegra-rt", "binary_version": "5.15.0-1033.33" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-buildinfo-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-headers-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-dbgsym", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-image-unsigned-5.15.0-1021-nvidia-tegra-igx-rt-dbgsym", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-modules-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-modules-extra-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1021", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1021", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx", "binary_version": "5.15.0-1021.21" }, { "binary_name": "linux-tools-5.15.0-1021-nvidia-tegra-igx-rt", "binary_version": "5.15.0-1021.21" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-headers-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-image-unsigned-5.15.0-1077-oracle-dbgsym", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-modules-extra-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-oracle-headers-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-oracle-tools-5.15.0-1077", "binary_version": "5.15.0-1077.83" }, { "binary_name": "linux-tools-5.15.0-1077-oracle", "binary_version": "5.15.0-1077.83" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-oracle-6.8-headers-6.8.0-1020", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-oracle-6.8-tools-6.8.0-1020", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-headers-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-image-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-image-5.15.0-1074-raspi-dbgsym", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-modules-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-modules-extra-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-raspi-headers-5.15.0-1074", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-raspi-tools-5.15.0-1074", "binary_version": "5.15.0-1074.77" }, { "binary_name": "linux-tools-5.15.0-1074-raspi", "binary_version": "5.15.0-1074.77" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-53-generic-dbgsym", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-headers-6.8.0-53", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-tools-6.8.0-53", "binary_version": "6.8.0-53.55.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1~22.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-headers-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-image-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-image-5.15.0-1044-xilinx-zynqmp-dbgsym", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-modules-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-tools-5.15.0-1044-xilinx-zynqmp", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1044", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1044", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-tools-common", "binary_version": "5.15.0-1044.48" }, { "binary_name": "linux-xilinx-zynqmp-tools-host", "binary_version": "5.15.0-1044.48" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-bluefield-cloud-tools-common", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-bluefield-headers-5.15.0-1062", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-bluefield-tools-5.15.0-1062", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-bluefield-tools-host", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-buildinfo-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-headers-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-image-unsigned-5.15.0-1062-bluefield-dbgsym", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-modules-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-modules-extra-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" }, { "binary_name": "linux-tools-5.15.0-1062-bluefield", "binary_version": "5.15.0-1062.64" } ], "availability": "Available for NVIDIA BlueField platforms", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-fips-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-aws-fips-headers-5.15.0-1080", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-aws-fips-tools-5.15.0-1080", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-headers-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-aws-fips-dbgsym", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-modules-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" }, { "binary_name": "linux-tools-5.15.0-1080-aws-fips", "binary_version": "5.15.0-1080.87+fips1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-fips-cloud-tools-5.15.0-1083", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-azure-fips-headers-5.15.0-1083", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-azure-fips-tools-5.15.0-1083", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-buildinfo-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-cloud-tools-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-headers-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1083-azure-fips-dbgsym", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-modules-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-modules-involflt-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" }, { "binary_name": "linux-tools-5.15.0-1083-azure-fips", "binary_version": "5.15.0-1083.92+fips1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-fips-headers-5.15.0-135", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-fips-tools-5.15.0-135", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-headers-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-135-fips-dbgsym", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-modules-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" }, { "binary_name": "linux-tools-5.15.0-135-fips", "binary_version": "5.15.0-135.146+fips1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-gcp-fips-headers-5.15.0-1079", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-gcp-fips-tools-5.15.0-1079", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-headers-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-image-unsigned-5.15.0-1079-gcp-fips-dbgsym", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-image-unsigned-hmac-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-modules-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-modules-extra-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" }, { "binary_name": "linux-tools-5.15.0-1079-gcp-fips", "binary_version": "5.15.0-1079.88+fips1" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-cloud-tools-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-headers-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-image-unsigned-5.15.0-1080-realtime-dbgsym", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-modules-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-modules-extra-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-modules-iwlwifi-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-cloud-tools-5.15.0-1080", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-cloud-tools-common", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-headers-5.15.0-1080", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-tools-5.15.0-1080", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-tools-common", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-realtime-tools-host", "binary_version": "5.15.0-1080.88" }, { "binary_name": "linux-tools-5.15.0-1080-realtime", "binary_version": "5.15.0-1080.88" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-buildinfo-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-buildinfo-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-doc", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-headers-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-6.8.0-54-generic-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-64k-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-image-unsigned-6.8.0-54-generic-dbgsym", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-lib-rust-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-libc-dev", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-extra-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-ipu6-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-modules-usbio-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-source-6.8.0", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54-generic", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-6.8.0-54-generic-64k", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-common", "binary_version": "6.8.0-54.56" }, { "binary_name": "linux-tools-host", "binary_version": "6.8.0-54.56" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-aws-headers-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-aws-tools-6.8.0-1023", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-buildinfo-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-cloud-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-headers-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-aws-dbgsym", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-modules-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-modules-extra-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" }, { "binary_name": "linux-tools-6.8.0-1023-aws", "binary_version": "6.8.0-1023.25" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-azure-headers-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-azure-tools-6.8.0-1025", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-buildinfo-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-cloud-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-headers-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1025-azure-dbgsym", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-extra-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-involflt-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" }, { "binary_name": "linux-tools-6.8.0-1025-azure", "binary_version": "6.8.0-1025.30" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-headers-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure-dbgsym", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-cloud-tools-common", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-headers-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-buildinfo-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-cloud-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-headers-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia-dbgsym", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-extra-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-gcp-headers-6.8.0-1024", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-gcp-tools-6.8.0-1024", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-headers-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-headers-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-tools-6.8.0-1024-gcp", "binary_version": "6.8.0-1024.26" }, { "binary_name": "linux-tools-6.8.0-1024-gcp-64k", "binary_version": "6.8.0-1024.26" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-headers-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-tools-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-gke-headers-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-gke-tools-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-headers-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-unsigned-6.8.0-1019-gke-dbgsym", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-extra-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-tools-6.8.0-1019-gke", "binary_version": "6.8.0-1019.23" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-cloud-tools-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-cloud-tools-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-headers-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-gkeop-tools-6.8.0-1006", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-headers-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop-dbgsym", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-modules-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-modules-extra-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" }, { "binary_name": "linux-tools-6.8.0-1006-gkeop", "binary_version": "6.8.0-1006.8" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-headers-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-ibm-headers-6.8.0-1022", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-ibm-tools-6.8.0-1022", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-ibm-dbgsym", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-extra-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" }, { "binary_name": "linux-tools-6.8.0-1022-ibm", "binary_version": "6.8.0-1022.22" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-buildinfo-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-cloud-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-headers-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-64k-dbgsym", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-image-unsigned-6.8.0-54-lowlatency-dbgsym", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-cloud-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-headers-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-lib-rust-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-lowlatency-tools-6.8.0-54", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency", "binary_version": "6.8.0-54.56.1" }, { "binary_name": "linux-tools-6.8.0-54-lowlatency-64k", "binary_version": "6.8.0-54.56.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-64k-dbgsym", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-dbgsym", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-nvidia-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-nvidia-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia", "binary_version": "6.8.0-1022.25" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-64k", "binary_version": "6.8.0-1022.25" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-buildinfo-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-headers-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-headers-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-64k-dbgsym", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-dbgsym", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-extra-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-extra-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-nvidia-6.11-headers-6.11.0-1007", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-nvidia-6.11-lib-rust-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-nvidia-6.11-tools-6.11.0-1007", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-tools-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-tools-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-buildinfo-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-headers-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-64k-dbgsym", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-image-unsigned-6.8.0-1022-nvidia-lowlatency-dbgsym", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-extra-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1022", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1022", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency", "binary_version": "6.8.0-1022.25.2" }, { "binary_name": "linux-tools-6.8.0-1022-nvidia-lowlatency-64k", "binary_version": "6.8.0-1022.25.2" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-headers-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem-dbgsym", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu6-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu7-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-usbio-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-vision-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-headers-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-tools-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-tools-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-headers-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oem-dbgsym", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-ipu6-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-usbio-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-oem-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-oem-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-tools-6.8.0-1024-oem", "binary_version": "6.8.0-1024.24" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-buildinfo-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-headers-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-headers-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-64k-dbgsym", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.0-1020-oracle-dbgsym", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-modules-extra-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-oracle-headers-6.8.0-1020", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-oracle-tools-6.8.0-1020", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-tools-6.8.0-1020-oracle", "binary_version": "6.8.0-1020.21" }, { "binary_name": "linux-tools-6.8.0-1020-oracle-64k", "binary_version": "6.8.0-1020.21" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-headers-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-image-6.8.0-1019-raspi-dbgsym", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-modules-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-raspi-headers-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-raspi-tools-6.8.0-1019", "binary_version": "6.8.0-1019.23" }, { "binary_name": "linux-tools-6.8.0-1019-raspi", "binary_version": "6.8.0-1019.23" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-headers-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-image-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-image-6.8.0-53-generic-dbgsym", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-modules-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-riscv-headers-6.8.0-53", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-riscv-tools-6.8.0-53", "binary_version": "6.8.0-53.55.1" }, { "binary_name": "linux-tools-6.8.0-53-generic", "binary_version": "6.8.0-53.55.1" } ], "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-headers-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-image-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-image-6.8.0-2018-raspi-realtime-dbgsym", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-modules-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-raspi-realtime-headers-6.8.0-2018", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-raspi-realtime-tools-6.8.0-2018", "binary_version": "6.8.0-2018.19" }, { "binary_name": "linux-tools-6.8.0-2018-raspi-realtime", "binary_version": "6.8.0-2018.19" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }
{ "binaries": [ { "binary_name": "linux-buildinfo-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-cloud-tools-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-headers-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-image-unsigned-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-image-unsigned-6.8.1-1016-realtime-dbgsym", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-extra-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-modules-iwlwifi-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-cloud-tools-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-headers-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-realtime-tools-6.8.1-1016", "binary_version": "6.8.1-1016.17" }, { "binary_name": "linux-tools-6.8.1-1016-realtime", "binary_version": "6.8.1-1016.17" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free read, which can be triggered remotely from an adjacent device. Being a read it can cause a memory leak and a denial-of-service." }