In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: defer partition scanning We need to suppress the partition scan from occuring within the controller's scanwork context. If a path error occurs here, the IO will wait until a path becomes available or all paths are torn down, but that action also occurs within scanwork, so it would deadlock. Defer the partion scan to a different context that does not block scan_work.
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1027", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-aws-6.8-headers-6.8.0-1027", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-aws-6.8-tools-6.8.0-1027", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-aws-dbgsym", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1027", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-azure-6.8-headers-6.8.0-1027", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-azure-6.8-tools-6.8.0-1027", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-azure-dbgsym", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-modules-involflt-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-gcp-6.8-headers-6.8.0-1028", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-gcp-6.8-tools-6.8.0-1028", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp-64k-dbgsym", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp-dbgsym", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-headers-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-headers-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-58", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-hwe-6.8-headers-6.8.0-58", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-hwe-6.8-tools-6.8.0-58", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-image-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-image-6.8.0-58-generic-dbgsym", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic-64k-dbgsym", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic-dbgsym", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-modules-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-modules-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-modules-ipu6-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-modules-usbio-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-tools-6.8.0-58-generic", "binary_version": "6.8.0-58.60~22.04.1" }, { "binary_name": "linux-tools-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-ibm-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-ibm-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-ibm-dbgsym", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-cloud-tools-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency-64k-dbgsym", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency-dbgsym", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-58", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-58", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-58", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-64k-dbgsym", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-dbgsym", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-nvidia-6.8-headers-6.8.0-1026", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-nvidia-6.8-tools-6.8.0-1026", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-buildinfo-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-headers-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle-64k-dbgsym", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle-dbgsym", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-modules-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-modules-extra-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-oracle-6.8-headers-6.8.0-1024", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-oracle-6.8-tools-6.8.0-1024", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25~22.04.1" }, { "binary_name": "linux-tools-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-headers-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-image-6.8.0-58-generic-dbgsym", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-modules-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-headers-6.8.0-58", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-riscv-6.8-tools-6.8.0-58", "binary_version": "6.8.0-58.60.1~22.04.1" }, { "binary_name": "linux-tools-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1~22.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-bpf-dev", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-buildinfo-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-buildinfo-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-cloud-tools-6.8.0-58", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-cloud-tools-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-cloud-tools-common", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-doc", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-headers-6.8.0-58", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-headers-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-headers-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-image-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-image-6.8.0-58-generic-dbgsym", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic-64k-dbgsym", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-image-unsigned-6.8.0-58-generic-dbgsym", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-lib-rust-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-libc-dev", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-modules-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-modules-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-modules-extra-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-modules-ipu6-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-modules-usbio-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-source-6.8.0", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-tools-6.8.0-58", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-tools-6.8.0-58-generic", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-tools-6.8.0-58-generic-64k", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-tools-common", "binary_version": "6.8.0-58.60" }, { "binary_name": "linux-tools-host", "binary_version": "6.8.0-58.60" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-aws-cloud-tools-6.8.0-1027", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-aws-headers-6.8.0-1027", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-aws-tools-6.8.0-1027", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-buildinfo-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-cloud-tools-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-headers-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-aws-dbgsym", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-modules-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-modules-extra-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29" }, { "binary_name": "linux-tools-6.8.0-1027-aws", "binary_version": "6.8.0-1027.29" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-azure-cloud-tools-6.8.0-1027", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-azure-headers-6.8.0-1027", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-azure-tools-6.8.0-1027", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-buildinfo-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-cloud-tools-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-headers-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-image-unsigned-6.8.0-1027-azure-dbgsym", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-modules-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-modules-extra-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-modules-involflt-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" }, { "binary_name": "linux-tools-6.8.0-1027-azure", "binary_version": "6.8.0-1027.32" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-headers-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-azure-6.11-tools-6.11.0-1012", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-cloud-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1012-azure-dbgsym", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1012-azure", "binary_version": "6.11.0-1012.12~24.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-cloud-tools-common", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-headers-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-azure-nvidia-tools-6.8.0-1014", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-buildinfo-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-cloud-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-headers-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-image-unsigned-6.8.0-1014-azure-nvidia-dbgsym", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-modules-extra-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" }, { "binary_name": "linux-tools-6.8.0-1014-azure-nvidia", "binary_version": "6.8.0-1014.15" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-buildinfo-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-gcp-headers-6.8.0-1028", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-gcp-tools-6.8.0-1028", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-headers-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-headers-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp-64k-dbgsym", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-image-unsigned-6.8.0-1028-gcp-dbgsym", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-modules-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-modules-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-modules-extra-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-modules-extra-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-tools-6.8.0-1028-gcp", "binary_version": "6.8.0-1028.30" }, { "binary_name": "linux-tools-6.8.0-1028-gcp-64k", "binary_version": "6.8.0-1028.30" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-buildinfo-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-headers-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-gcp-6.11-tools-6.11.0-1011", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-headers-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-64k-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-image-unsigned-6.11.0-1011-gcp-dbgsym", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-modules-extra-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp", "binary_version": "6.11.0-1011.11~24.04.1" }, { "binary_name": "linux-tools-6.11.0-1011-gcp-64k", "binary_version": "6.11.0-1011.11~24.04.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1023-gke", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-gke-headers-6.8.0-1023", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-gke-tools-6.8.0-1023", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-headers-6.8.0-1023-gke", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-gke", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-image-unsigned-6.8.0-1023-gke-dbgsym", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-modules-6.8.0-1023-gke", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-modules-extra-6.8.0-1023-gke", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1023-gke", "binary_version": "6.8.0-1023.27" }, { "binary_name": "linux-tools-6.8.0-1023-gke", "binary_version": "6.8.0-1023.27" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1010-gkeop", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-cloud-tools-6.8.0-1010-gkeop", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-gkeop-cloud-tools-6.8.0-1010", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-gkeop-headers-6.8.0-1010", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-gkeop-tools-6.8.0-1010", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-headers-6.8.0-1010-gkeop", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-image-unsigned-6.8.0-1010-gkeop", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-image-unsigned-6.8.0-1010-gkeop-dbgsym", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-modules-6.8.0-1010-gkeop", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-modules-extra-6.8.0-1010-gkeop", "binary_version": "6.8.0-1010.12" }, { "binary_name": "linux-tools-6.8.0-1010-gkeop", "binary_version": "6.8.0-1010.12" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-headers-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-ibm-headers-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-ibm-tools-6.8.0-1024", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-ibm-dbgsym", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-extra-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24" }, { "binary_name": "linux-tools-6.8.0-1024-ibm", "binary_version": "6.8.0-1024.24" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-buildinfo-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-cloud-tools-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-headers-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-headers-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency-64k-dbgsym", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-image-unsigned-6.8.0-58-lowlatency-dbgsym", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-lowlatency-cloud-tools-6.8.0-58", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-lowlatency-headers-6.8.0-58", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-lowlatency-lib-rust-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-lowlatency-tools-6.8.0-58", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-modules-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-modules-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-tools-6.8.0-58-lowlatency", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-tools-6.8.0-58-lowlatency-64k", "binary_version": "6.8.0-58.60.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-buildinfo-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-headers-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-headers-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-64k-dbgsym", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-dbgsym", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-modules-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-modules-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-modules-extra-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-nvidia-headers-6.8.0-1026", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-nvidia-tools-6.8.0-1026", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-tools-6.8.0-1026-nvidia", "binary_version": "6.8.0-1026.29" }, { "binary_name": "linux-tools-6.8.0-1026-nvidia-64k", "binary_version": "6.8.0-1026.29" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-buildinfo-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-headers-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-headers-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-64k-dbgsym", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-image-unsigned-6.11.0-1007-nvidia-dbgsym", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-extra-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-extra-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-modules-nvidia-fs-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-nvidia-6.11-headers-6.11.0-1007", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-nvidia-6.11-lib-rust-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-nvidia-6.11-tools-6.11.0-1007", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-tools-6.11.0-1007-nvidia", "binary_version": "6.11.0-1007.7" }, { "binary_name": "linux-tools-6.11.0-1007-nvidia-64k", "binary_version": "6.11.0-1007.7" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1026-nvidia-lowlatency", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-buildinfo-6.8.0-1026-nvidia-lowlatency-64k", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-headers-6.8.0-1026-nvidia-lowlatency", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-headers-6.8.0-1026-nvidia-lowlatency-64k", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-lowlatency", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-lowlatency-64k", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-lowlatency-64k-dbgsym", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-nvidia-lowlatency-dbgsym", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-modules-6.8.0-1026-nvidia-lowlatency", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-modules-6.8.0-1026-nvidia-lowlatency-64k", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-modules-extra-6.8.0-1026-nvidia-lowlatency", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1026-nvidia-lowlatency", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-modules-nvidia-fs-6.8.0-1026-nvidia-lowlatency-64k", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1026", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1026", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-tools-6.8.0-1026-nvidia-lowlatency", "binary_version": "6.8.0-1026.29.1" }, { "binary_name": "linux-tools-6.8.0-1026-nvidia-lowlatency-64k", "binary_version": "6.8.0-1026.29.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-headers-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-image-unsigned-6.11.0-1015-oem-dbgsym", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu6-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-ipu7-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-iwlwifi-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-usbio-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-modules-vision-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-headers-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-oem-6.11-tools-6.11.0-1015", "binary_version": "6.11.0-1015.15" }, { "binary_name": "linux-tools-6.11.0-1015-oem", "binary_version": "6.11.0-1015.15" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-headers-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-image-unsigned-6.8.0-1026-oem-dbgsym", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-modules-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-modules-ipu6-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-modules-iwlwifi-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-modules-usbio-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-oem-6.8-headers-6.8.0-1026", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-oem-6.8-tools-6.8.0-1026", "binary_version": "6.8.0-1026.26" }, { "binary_name": "linux-tools-6.8.0-1026-oem", "binary_version": "6.8.0-1026.26" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-buildinfo-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-headers-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-headers-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle-64k-dbgsym", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-image-unsigned-6.8.0-1024-oracle-dbgsym", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-modules-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-modules-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-modules-extra-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-modules-extra-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-oracle-headers-6.8.0-1024", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-oracle-tools-6.8.0-1024", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-tools-6.8.0-1024-oracle", "binary_version": "6.8.0-1024.25" }, { "binary_name": "linux-tools-6.8.0-1024-oracle-64k", "binary_version": "6.8.0-1024.25" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-1028-raspi", "binary_version": "6.8.0-1028.32" }, { "binary_name": "linux-headers-6.8.0-1028-raspi", "binary_version": "6.8.0-1028.32" }, { "binary_name": "linux-image-6.8.0-1028-raspi", "binary_version": "6.8.0-1028.32" }, { "binary_name": "linux-image-6.8.0-1028-raspi-dbgsym", "binary_version": "6.8.0-1028.32" }, { "binary_name": "linux-modules-6.8.0-1028-raspi", "binary_version": "6.8.0-1028.32" }, { "binary_name": "linux-raspi-headers-6.8.0-1028", "binary_version": "6.8.0-1028.32" }, { "binary_name": "linux-raspi-tools-6.8.0-1028", "binary_version": "6.8.0-1028.32" }, { "binary_name": "linux-tools-6.8.0-1028-raspi", "binary_version": "6.8.0-1028.32" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-headers-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-image-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-image-6.8.0-58-generic-dbgsym", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-modules-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-riscv-headers-6.8.0-58", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-riscv-tools-6.8.0-58", "binary_version": "6.8.0-58.60.1" }, { "binary_name": "linux-tools-6.8.0-58-generic", "binary_version": "6.8.0-58.60.1" } ], "availability": "No subscription required" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.0-2023-raspi-realtime", "binary_version": "6.8.0-2023.24" }, { "binary_name": "linux-headers-6.8.0-2023-raspi-realtime", "binary_version": "6.8.0-2023.24" }, { "binary_name": "linux-image-6.8.0-2023-raspi-realtime", "binary_version": "6.8.0-2023.24" }, { "binary_name": "linux-image-6.8.0-2023-raspi-realtime-dbgsym", "binary_version": "6.8.0-2023.24" }, { "binary_name": "linux-modules-6.8.0-2023-raspi-realtime", "binary_version": "6.8.0-2023.24" }, { "binary_name": "linux-raspi-realtime-headers-6.8.0-2023", "binary_version": "6.8.0-2023.24" }, { "binary_name": "linux-raspi-realtime-tools-6.8.0-2023", "binary_version": "6.8.0-2023.24" }, { "binary_name": "linux-tools-6.8.0-2023-raspi-realtime", "binary_version": "6.8.0-2023.24" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "priority_reason": "This vulnerability arises purely from internal driver logic, in response to ordinary and expected runtime events. There is no user involvement (nor any sort of attacker control over this vulnerability).", "binaries": [ { "binary_name": "linux-buildinfo-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-cloud-tools-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-headers-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-image-unsigned-6.8.1-1020-realtime-dbgsym", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-modules-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-modules-extra-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-modules-iwlwifi-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-realtime-cloud-tools-6.8.1-1020", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-realtime-headers-6.8.1-1020", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-realtime-tools-6.8.1-1020", "binary_version": "6.8.1-1020.21" }, { "binary_name": "linux-tools-6.8.1-1020-realtime", "binary_version": "6.8.1-1020.21" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }