In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reset IRTE to host control if new route isn't postable Restore an IRTE back to host control (remapped or posted MSI mode) if the new GSI route prevents posting the IRQ directly to a vCPU, regardless of the GSI routing type. Updating the IRTE if and only if the new GSI is an MSI results in KVM leaving an IRTE posting to a vCPU. The dangling IRTE can result in interrupts being incorrectly delivered to the guest, and in the worst case scenario can result in use-after-free, e.g. if the VM is torn down, but the underlying host IRQ isn't freed.
{
"binaries": [
{
"binary_name": "block-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "block-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "dasd-extra-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "dasd-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "firewire-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "floppy-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-cloud-tools-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-tools-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-udebs-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-udebs-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "message-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pata-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pcmcia-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "serial-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "virtio-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-5.0-tools-5.0.0-1027",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-aws-headers-5.0.0-1027",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-buildinfo-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-headers-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-image-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-modules-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-modules-extra-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-tools-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-5.3-cloud-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-aws-5.3-headers-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-aws-5.3-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-buildinfo-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-cloud-tools-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-headers-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-image-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-modules-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-modules-extra-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-tools-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-azure-headers-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-azure-tools-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-buildinfo-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-headers-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-modules-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-modules-extra-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-tools-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-5.3-cloud-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-azure-5.3-headers-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-azure-5.3-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-buildinfo-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-cloud-tools-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-headers-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-modules-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-modules-extra-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-tools-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-edge-cloud-tools-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-azure-edge-tools-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-azure-headers-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-headers-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-modules-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-modules-extra-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-tools-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-gcp-headers-5.0.0-1034",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-gcp-tools-5.0.0-1034",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-headers-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-modules-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-modules-extra-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-tools-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-gcp-5.3-headers-5.3.0-1032",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-gcp-5.3-tools-5.3.0-1032",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-headers-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-modules-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-tools-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-gke-4.15-headers-4.15.0-1079",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-gke-4.15-tools-4.15.0-1079",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-headers-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-modules-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-modules-extra-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-tools-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-gke-5.4-headers-5.4.0-1080",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-gke-5.4-tools-5.4.0-1080",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-headers-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-source-5.4.0",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-tools-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "crypto-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fat-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "firewire-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "floppy-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fs-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fs-secondary-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "input-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "ipmi-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "kernel-image-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-buildinfo-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-buildinfo-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-cloud-tools-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-cloud-tools-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-headers-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-headers-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-cloud-tools-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-headers-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-tools-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-udebs-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-unsigned-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-unsigned-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-extra-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-source-5.3.0",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-tools-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-tools-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "md-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "message-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "mouse-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "multipath-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nfs-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-pcmcia-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-shared-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-usb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "parport-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pata-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pcmcia-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pcmcia-storage-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "plip-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "ppp-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "sata-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "scsi-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "serial-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "storage-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "usb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "virtio-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "vlan-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "block-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "crypto-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "crypto-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "dasd-extra-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "dasd-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fat-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fat-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "firewire-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "floppy-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-core-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-secondary-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-secondary-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "input-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "input-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ipmi-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ipmi-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "kernel-image-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "kernel-image-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-cloud-tools-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-tools-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-udebs-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-udebs-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-extra-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-source-5.3.0",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "md-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "md-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "message-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "mouse-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "mouse-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "multipath-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "multipath-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nfs-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nfs-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-pcmcia-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-shared-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-shared-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-usb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-usb-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "parport-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "parport-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pata-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pcmcia-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pcmcia-storage-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "plip-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "plip-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ppp-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ppp-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "sata-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "sata-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "scsi-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "scsi-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "serial-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "storage-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "storage-core-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "usb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "usb-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "virtio-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "vlan-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "vlan-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "crypto-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fat-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "firewire-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "floppy-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fs-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fs-secondary-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "input-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "ipmi-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "irda-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "kernel-image-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-buildinfo-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-headers-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-modules-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-oem-headers-4.15.0-1103",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-oem-tools-4.15.0-1103",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-tools-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-udebs-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "md-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "message-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "mouse-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "multipath-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nfs-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-shared-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-usb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "parport-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pata-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pcmcia-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "plip-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "ppp-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "sata-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "scsi-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "serial-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "storage-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "usb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "virtio-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "vlan-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-headers-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-modules-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-modules-extra-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-oracle-5.0-headers-5.0.0-1014",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-oracle-5.0-tools-5.0.0-1014",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-tools-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-headers-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-modules-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-oracle-5.3-headers-5.3.0-1030",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-oracle-5.3-tools-5.3.0-1030",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-tools-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-5.11-cloud-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-aws-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-aws-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-aws-5.13-headers-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-aws-5.13-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-5.8-cloud-tools-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-aws-5.8-headers-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-aws-5.8-tools-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-5.11-cloud-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-azure-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-azure-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-buildinfo-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-cloud-tools-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-headers-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-modules-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-tools-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-5.13-cloud-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-azure-5.13-headers-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-azure-5.13-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-5.8-cloud-tools-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-azure-5.8-headers-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-azure-5.8-tools-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-image-unsigned-5.4.0-1103-azure-fde",
"binary_version": "5.4.0-1103.109+cvm1.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-gcp-5.11-headers-5.11.0-1029",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-gcp-5.11-tools-5.11.0-1029",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-headers-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-modules-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-modules-extra-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-tools-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-headers-5.13.0-1033",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-tools-5.13.0-1033",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-gcp-5.8-headers-5.8.0-1039",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-gcp-5.8-tools-5.8.0-1039",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-headers-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-modules-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-modules-extra-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-tools-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-gke-headers-5.4.0-1105",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-gke-tools-5.4.0-1105",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-headers-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-modules-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-modules-extra-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-tools-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-gke-5.15-headers-5.15.0-1039",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-gke-5.15-tools-5.15.0-1039",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-cloud-tools-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-headers-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-source-5.4.0",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-tools-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-headers-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-modules-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-modules-extra-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-tools-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-headers-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-tools-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "block-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "block-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "dasd-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "floppy-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-cloud-tools-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-cloud-tools-common",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-headers-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-source-5.11.0",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-common",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-host",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "message-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "message-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pata-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "serial-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "virtio-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "virtio-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "block-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "block-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "dasd-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "floppy-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-cloud-tools-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-cloud-tools-common",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-headers-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-source-5.13.0",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-common",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-host",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "message-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "message-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pata-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "serial-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "virtio-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "virtio-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "block-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "block-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "dasd-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "floppy-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-cloud-tools-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-cloud-tools-common",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-headers-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-source-5.8.0",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-common",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-host",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pata-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "serial-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-headers-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-cloud-tools-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-cloud-tools-common",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-headers-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-source-5.13.0",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-common",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-host",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-modules-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-modules-extra-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-tools-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-headers-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-image-unsigned-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-modules-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-headers-5.10.0-1057",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-tools-5.10.0-1057",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-tools-host",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-tools-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-headers-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-modules-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-headers-5.13.0-1029",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-tools-5.13.0-1029",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-tools-host",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-tools-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-headers-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-image-unsigned-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-modules-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-modules-iwlwifi-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-headers-5.14.0-1059",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-tools-5.14.0-1059",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-tools-host",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-tools-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-headers-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-image-unsigned-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-modules-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-headers-5.6.0-1056",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-tools-5.6.0-1056",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-tools-host",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-tools-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-oracle-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-oracle-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-oracle-5.13-headers-5.13.0-1036",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-oracle-5.13-tools-5.13.0-1036",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-oracle-5.8-headers-5.8.0-1038",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-oracle-5.8-tools-5.8.0-1038",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-headers-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-image-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-modules-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-raspi2-headers-5.4.0-1006",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-raspi2-tools-5.4.0-1006",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-tools-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "crypto-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fat-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "firewire-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fs-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fs-secondary-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "input-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "ipmi-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "kernel-image-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-buildinfo-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-headers-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-image-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-modules-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-modules-extra-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-riscv-headers-5.4.0-40",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-riscv-tools-5.4.0-40",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-tools-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "md-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "message-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "mouse-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "multipath-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nfs-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-shared-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-usb-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "parport-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "pata-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "plip-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "ppp-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "sata-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "scsi-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "storage-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "usb-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "virtio-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "vlan-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-headers-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-image-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-modules-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-modules-extra-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-riscv-5.11-headers-5.11.0-1031",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-riscv-5.11-tools-5.11.0-1031",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-tools-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-riscv-5.8-headers-5.8.0-29",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-riscv-5.8-tools-5.8.0-29",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "pata-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-buildinfo-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-buildinfo-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-cloud-tools-5.15.0-144",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-cloud-tools-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-headers-5.15.0-144",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-headers-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-headers-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-headers-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-image-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-image-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-extra-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-source-5.15.0",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-5.15.0-144",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-5.15.0-144-generic",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-common",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-host",
"binary_version": "5.15.0-144.157"
}
]
}{
"binaries": [
{
"binary_name": "linux-allwinner-5.19-headers-5.19.0-1015",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-allwinner-5.19-tools-5.19.0-1015",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-buildinfo-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-aws-headers-5.15.0-1088",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-aws-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-buildinfo-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-buildinfo-5.15.0-1088-aws-64k",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1088-aws-64k",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-headers-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-headers-5.15.0-1088-aws-64k",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1088-aws-64k",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-modules-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-modules-5.15.0-1088-aws-64k",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-modules-extra-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-modules-extra-5.15.0-1088-aws-64k",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-tools-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95"
},
{
"binary_name": "linux-tools-5.15.0-1088-aws-64k",
"binary_version": "5.15.0-1088.95"
}
]
}{
"binaries": [
{
"binary_name": "linux-aws-5.19-cloud-tools-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-aws-5.19-headers-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-aws-5.19-tools-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-buildinfo-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-aws-6.2-headers-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-aws-6.2-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-aws-6.5-headers-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-aws-6.5-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-aws-6.8-cloud-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-aws-6.8-headers-6.8.0-1046",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-aws-6.8-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.15.0-1094",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-azure-headers-5.15.0-1094",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-azure-tools-5.15.0-1094",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-buildinfo-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-headers-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-modules-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-modules-extra-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-modules-involflt-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
},
{
"binary_name": "linux-tools-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103"
}
]
}{
"binaries": [
{
"binary_name": "linux-azure-5.19-cloud-tools-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-azure-5.19-headers-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-azure-5.19-tools-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-buildinfo-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-headers-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-modules-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-modules-extra-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-tools-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-azure-6.2-headers-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-azure-6.2-tools-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-azure-6.5-headers-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-azure-6.5-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-6.8-cloud-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-azure-6.8-headers-6.8.0-1044",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-azure-6.8-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-modules-involflt-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-image-unsigned-5.15.0-1102-azure-fde",
"binary_version": "5.15.0-1102.111.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-image-unsigned-5.19.0-1027-azure-fde",
"binary_version": "5.19.0-1027.30~22.04.2.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-image-unsigned-6.2.0-1019-azure-fde",
"binary_version": "6.2.0-1019.19~22.04.1.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fde-6.8-cloud-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-azure-fde-6.8-headers-6.8.0-1044",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-azure-fde-6.8-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-modules-involflt-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96"
},
{
"binary_name": "linux-gcp-headers-5.15.0-1087",
"binary_version": "5.15.0-1087.96"
},
{
"binary_name": "linux-gcp-tools-5.15.0-1087",
"binary_version": "5.15.0-1087.96"
},
{
"binary_name": "linux-headers-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96"
},
{
"binary_name": "linux-modules-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96"
},
{
"binary_name": "linux-modules-extra-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96"
},
{
"binary_name": "linux-tools-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-gcp-5.19-headers-5.19.0-1030",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-gcp-5.19-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-gcp-6.2-headers-6.2.0-1021",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-gcp-6.2-tools-6.2.0-1021",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-gcp-6.5-headers-6.5.0-1025",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-gcp-6.5-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-buildinfo-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-gcp-6.8-headers-6.8.0-1047",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-gcp-6.8-tools-6.8.0-1047",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-headers-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-headers-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-modules-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-modules-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-modules-extra-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-modules-extra-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-tools-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50~22.04.2"
},
{
"binary_name": "linux-tools-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50~22.04.2"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1085-gke",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-gke-headers-5.15.0-1085",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-gke-tools-5.15.0-1085",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-headers-5.15.0-1085-gke",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1085-gke",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-modules-5.15.0-1085-gke",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-modules-extra-5.15.0-1085-gke",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-tools-5.15.0-1085-gke",
"binary_version": "5.15.0-1085.91"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1070-gkeop",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1070-gkeop",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-gkeop-cloud-tools-5.15.0-1070",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-gkeop-headers-5.15.0-1070",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-gkeop-tools-5.15.0-1070",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-headers-5.15.0-1070-gkeop",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1070-gkeop",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-modules-5.15.0-1070-gkeop",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-modules-extra-5.15.0-1070-gkeop",
"binary_version": "5.15.0-1070.78"
},
{
"binary_name": "linux-tools-5.15.0-1070-gkeop",
"binary_version": "5.15.0-1070.78"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-buildinfo-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-buildinfo-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-cloud-tools-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-cloud-tools-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-cloud-tools-common",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-headers-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-common",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-host",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-unsigned-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-unsigned-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-extra-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-ipu6-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-ivsc-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-iwlwifi-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-source-5.19.0",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-cloud-tools-common",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-headers-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-common",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-host",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-source-6.2.0",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-cloud-tools-common",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-common",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-host",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-source-6.5.0",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-hwe-6.8-cloud-tools-6.8.0-100",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-hwe-6.8-headers-6.8.0-100",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-hwe-6.8-tools-6.8.0-100",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-image-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-modules-usbio-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100~22.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-headers-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-ibm-cloud-tools-common",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-ibm-headers-5.15.0-1080",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-ibm-source-5.15.0",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-ibm-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-ibm-tools-common",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-modules-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-modules-extra-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83"
},
{
"binary_name": "linux-tools-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-ibm-6.8-headers-6.8.0-1043",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-ibm-6.8-tools-6.8.0-1043",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-common",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-common",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-host",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-headers-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-intel-iotg-cloud-tools-common",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-intel-iotg-headers-5.15.0-1083",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-intel-iotg-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-intel-iotg-tools-common",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-intel-iotg-tools-host",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-modules-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-modules-extra-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
},
{
"binary_name": "linux-tools-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1084-kvm",
"binary_version": "5.15.0-1084.89"
},
{
"binary_name": "linux-headers-5.15.0-1084-kvm",
"binary_version": "5.15.0-1084.89"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1084-kvm",
"binary_version": "5.15.0-1084.89"
},
{
"binary_name": "linux-kvm-headers-5.15.0-1084",
"binary_version": "5.15.0-1084.89"
},
{
"binary_name": "linux-kvm-tools-5.15.0-1084",
"binary_version": "5.15.0-1084.89"
},
{
"binary_name": "linux-modules-5.15.0-1084-kvm",
"binary_version": "5.15.0-1084.89"
},
{
"binary_name": "linux-tools-5.15.0-1084-kvm",
"binary_version": "5.15.0-1084.89"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-buildinfo-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-cloud-tools-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-headers-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-headers-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-lowlatency-cloud-tools-5.15.0-144",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-lowlatency-headers-5.15.0-144",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-lowlatency-tools-5.15.0-144",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157"
},
{
"binary_name": "linux-tools-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-headers-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-headers-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-common",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-headers-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-common",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-host",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-ipu6-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-ivsc-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-iwlwifi-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-tools-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-tools-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-common",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-host",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-common",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-host",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-cloud-tools-6.8.0-100",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-headers-6.8.0-100",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-lib-rust-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.8-tools-6.8.0-100",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1~22.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-buildinfo-5.15.0-1082-nvidia-lowlatency",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1082-nvidia-lowlatency",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-headers-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-headers-5.15.0-1082-nvidia-lowlatency",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1082-nvidia-lowlatency",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-modules-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-modules-5.15.0-1082-nvidia-lowlatency",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-modules-extra-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-modules-nvidia-fs-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-modules-nvidia-fs-5.15.0-1082-nvidia-lowlatency",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-nvidia-cloud-tools-5.15.0-1082",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-nvidia-cloud-tools-common",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-nvidia-headers-5.15.0-1082",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-nvidia-tools-5.15.0-1082",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-nvidia-tools-common",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-nvidia-tools-host",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-tools-5.15.0-1082-nvidia",
"binary_version": "5.15.0-1082.83"
},
{
"binary_name": "linux-tools-5.15.0-1082-nvidia-lowlatency",
"binary_version": "5.15.0-1082.83"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-headers-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-headers-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-extra-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-headers-6.2.0-1015",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-tools-6.2.0-1015",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-tools-host",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-tools-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-tools-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-headers-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-headers-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-extra-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-headers-6.5.0-1024",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-tools-host",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-tools-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-tools-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-nvidia-6.8-headers-6.8.0-1046",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-nvidia-6.8-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49~22.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-buildinfo-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-headers-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-headers-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-modules-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-modules-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-modules-extra-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-nvidia-tegra-headers-5.15.0-1041",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-nvidia-tegra-tools-5.15.0-1041",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-tools-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41"
},
{
"binary_name": "linux-tools-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1030-nvidia-tegra-igx",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-buildinfo-5.15.0-1030-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-headers-5.15.0-1030-nvidia-tegra-igx",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-headers-5.15.0-1030-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1030-nvidia-tegra-igx",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1030-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-modules-5.15.0-1030-nvidia-tegra-igx",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-modules-5.15.0-1030-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-modules-extra-5.15.0-1030-nvidia-tegra-igx",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1030",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1030",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-tools-5.15.0-1030-nvidia-tegra-igx",
"binary_version": "5.15.0-1030.30"
},
{
"binary_name": "linux-tools-5.15.0-1030-nvidia-tegra-igx-rt",
"binary_version": "5.15.0-1030.30"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-headers-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-image-unsigned-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-ipu6-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-ivsc-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-iwlwifi-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-headers-5.17.0-1035",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-tools-5.17.0-1035",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-tools-host",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-tools-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-headers-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-image-unsigned-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-ipu6-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-ivsc-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-iwlwifi-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-headers-6.0.0-1021",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-tools-6.0.0-1021",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-tools-host",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-tools-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-headers-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-image-unsigned-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-ipu6-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-ivsc-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-iwlwifi-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-headers-6.1.0-1036",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-tools-6.1.0-1036",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-tools-host",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-tools-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-headers-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-ipu6-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-ivsc-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-usbio-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-headers-6.5.0-1027",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-lib-rust-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-tools-6.5.0-1027",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-tools-host",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-tools-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-headers-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-modules-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-modules-extra-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-oracle-headers-5.15.0-1085",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-oracle-tools-5.15.0-1085",
"binary_version": "5.15.0-1085.91"
},
{
"binary_name": "linux-tools-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-oracle-6.5-headers-6.5.0-1027",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-oracle-6.5-tools-6.5.0-1027",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-oracle-6.8-headers-6.8.0-1043",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-oracle-6.8-tools-6.8.0-1043",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44~22.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1083-raspi",
"binary_version": "5.15.0-1083.86"
},
{
"binary_name": "linux-headers-5.15.0-1083-raspi",
"binary_version": "5.15.0-1083.86"
},
{
"binary_name": "linux-image-5.15.0-1083-raspi",
"binary_version": "5.15.0-1083.86"
},
{
"binary_name": "linux-modules-5.15.0-1083-raspi",
"binary_version": "5.15.0-1083.86"
},
{
"binary_name": "linux-modules-extra-5.15.0-1083-raspi",
"binary_version": "5.15.0-1083.86"
},
{
"binary_name": "linux-raspi-headers-5.15.0-1083",
"binary_version": "5.15.0-1083.86"
},
{
"binary_name": "linux-raspi-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.86"
},
{
"binary_name": "linux-tools-5.15.0-1083-raspi",
"binary_version": "5.15.0-1083.86"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-headers-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-modules-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-modules-extra-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-cloud-tools-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-cloud-tools-common",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-headers-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-common",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-host",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-tools-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-headers-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-image-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-modules-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-modules-extra-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-riscv-headers-5.15.0-1028",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-riscv-tools-5.15.0-1028",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-tools-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-riscv-5.19-headers-5.19.0-1021",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-riscv-5.19-tools-5.19.0-1021",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-headers-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-image-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-modules-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-riscv-6.8-headers-6.8.0-100",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-riscv-6.8-tools-6.8.0-100",
"binary_version": "6.8.0-100.100~22.04.1"
},
{
"binary_name": "linux-tools-6.8.0-100-generic",
"binary_version": "6.8.0-100.100~22.04.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-starfive-5.19-headers-5.19.0-1020",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-starfive-5.19-tools-5.19.0-1020",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-starfive-6.2-headers-6.2.0-1009",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-starfive-6.2-tools-6.2.0-1009",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-starfive-6.5-headers-6.5.0-1018",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-starfive-6.5-tools-6.5.0-1018",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1052-xilinx-zynqmp",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-headers-5.15.0-1052-xilinx-zynqmp",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-image-5.15.0-1052-xilinx-zynqmp",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-modules-5.15.0-1052-xilinx-zynqmp",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-tools-5.15.0-1052-xilinx-zynqmp",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1052",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1052",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-common",
"binary_version": "5.15.0-1052.56"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-host",
"binary_version": "5.15.0-1052.56"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-bpf-dev",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-buildinfo-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-buildinfo-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-cloud-tools-6.8.0-100",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-cloud-tools-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-headers-6.8.0-100",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-headers-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-headers-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-image-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-lib-rust-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-modules-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-modules-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-modules-extra-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-modules-ipu6-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-modules-usbio-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-source-6.8.0",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-tools-6.8.0-100",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-tools-6.8.0-100-generic",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-tools-6.8.0-100-generic-64k",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-tools-common",
"binary_version": "6.8.0-100.100"
},
{
"binary_name": "linux-tools-host",
"binary_version": "6.8.0-100.100"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-aws-headers-6.8.0-1046",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-aws-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-headers-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-headers-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-extra-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-extra-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-tools-6.8.0-1046-aws",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-tools-6.8.0-1046-aws-64k",
"binary_version": "6.8.0-1046.49"
}
]
}{
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-azure-headers-6.8.0-1044",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-azure-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-buildinfo-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-headers-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-modules-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-modules-extra-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-modules-involflt-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
},
{
"binary_name": "linux-tools-6.8.0-1044-azure",
"binary_version": "6.8.0-1044.50"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-6.11-cloud-tools-6.11.0-1018",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-azure-6.11-headers-6.11.0-1018",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-azure-6.11-tools-6.11.0-1018",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-cloud-tools-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1018-azure",
"binary_version": "6.11.0-1018.18~24.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fde-cloud-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-azure-fde-headers-6.8.0-1044",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-azure-fde-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-buildinfo-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-headers-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-modules-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-modules-extra-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-modules-involflt-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
},
{
"binary_name": "linux-tools-6.8.0-1044-azure-fde",
"binary_version": "6.8.0-1044.51"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-nvidia-cloud-tools-6.8.0-1029",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-azure-nvidia-headers-6.8.0-1029",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-azure-nvidia-tools-6.8.0-1029",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-buildinfo-6.8.0-1029-azure-nvidia",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1029-azure-nvidia",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-headers-6.8.0-1029-azure-nvidia",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1029-azure-nvidia",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-modules-6.8.0-1029-azure-nvidia",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-modules-extra-6.8.0-1029-azure-nvidia",
"binary_version": "6.8.0-1029.32"
},
{
"binary_name": "linux-tools-6.8.0-1029-azure-nvidia",
"binary_version": "6.8.0-1029.32"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-buildinfo-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-gcp-headers-6.8.0-1047",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-gcp-tools-6.8.0-1047",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-headers-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-headers-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-modules-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-modules-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-modules-extra-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-modules-extra-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-tools-6.8.0-1047-gcp",
"binary_version": "6.8.0-1047.50"
},
{
"binary_name": "linux-tools-6.8.0-1047-gcp-64k",
"binary_version": "6.8.0-1047.50"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-1017-gcp",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.11.0-1017-gcp-64k",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-gcp-6.11-headers-6.11.0-1017",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-gcp-6.11-lib-rust-6.11.0-1017-gcp",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-gcp-6.11-tools-6.11.0-1017",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1017-gcp",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1017-gcp-64k",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1017-gcp",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1017-gcp-64k",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1017-gcp",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1017-gcp-64k",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.11.0-1017-gcp",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.11.0-1017-gcp-64k",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1017-gcp",
"binary_version": "6.11.0-1017.17~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1017-gcp-64k",
"binary_version": "6.11.0-1017.17~24.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.14.0-1011-gcp",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.14.0-1011-gcp-64k",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-gcp-6.14-headers-6.14.0-1011",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-gcp-6.14-tools-6.14.0-1011",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1011-gcp",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1011-gcp-64k",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1011-gcp",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1011-gcp-64k",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-lib-rust-6.14.0-1011-gcp",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1011-gcp",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1011-gcp-64k",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1011-gcp",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1011-gcp-64k",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1011-gcp",
"binary_version": "6.14.0-1011.11~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1011-gcp-64k",
"binary_version": "6.14.0-1011.11~24.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1043-gke",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-buildinfo-6.8.0-1043-gke-64k",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-gke-headers-6.8.0-1043",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-gke-tools-6.8.0-1043",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-headers-6.8.0-1043-gke",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-headers-6.8.0-1043-gke-64k",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-gke",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-gke-64k",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-modules-6.8.0-1043-gke",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-modules-6.8.0-1043-gke-64k",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-gke",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-gke-64k",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1043-gke",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-tools-6.8.0-1043-gke",
"binary_version": "6.8.0-1043.48"
},
{
"binary_name": "linux-tools-6.8.0-1043-gke-64k",
"binary_version": "6.8.0-1043.48"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1030-gkeop",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1030-gkeop",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-gkeop-cloud-tools-6.8.0-1030",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-gkeop-headers-6.8.0-1030",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-gkeop-tools-6.8.0-1030",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-headers-6.8.0-1030-gkeop",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1030-gkeop",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-modules-6.8.0-1030-gkeop",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-modules-extra-6.8.0-1030-gkeop",
"binary_version": "6.8.0-1030.33"
},
{
"binary_name": "linux-tools-6.8.0-1030-gkeop",
"binary_version": "6.8.0-1030.33"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.11.0-29-generic-64k",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-cloud-tools-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-29-generic-64k",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-hwe-6.11-cloud-tools-6.11.0-29",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-hwe-6.11-headers-6.11.0-29",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-hwe-6.11-lib-rust-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-hwe-6.11-tools-6.11.0-29",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-image-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-29-generic-64k",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-29-generic-64k",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-ipu7-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-usbio-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-modules-vision-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-29-generic",
"binary_version": "6.11.0-29.29~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-29-generic-64k",
"binary_version": "6.11.0-29.29~24.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-headers-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-ibm-headers-6.8.0-1043",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-ibm-tools-6.8.0-1043",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-modules-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43"
},
{
"binary_name": "linux-tools-6.8.0-1043-ibm",
"binary_version": "6.8.0-1043.43"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-headers-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-intel-cloud-tools-6.8.0-1007",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-intel-headers-6.8.0-1007",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-intel-tools-6.8.0-1007",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-modules-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-modules-extra-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
},
{
"binary_name": "linux-tools-6.8.0-1007-intel",
"binary_version": "6.8.0-1007.14"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-headers-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-headers-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-lowlatency-cloud-tools-6.8.0-100",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-lowlatency-headers-6.8.0-100",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-lowlatency-lib-rust-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-lowlatency-tools-6.8.0-100",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-modules-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-modules-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-tools-6.8.0-100-lowlatency",
"binary_version": "6.8.0-100.100.1"
},
{
"binary_name": "linux-tools-6.8.0-100-lowlatency-64k",
"binary_version": "6.8.0-100.100.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.11.0-1016-lowlatency-64k",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-cloud-tools-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-headers-6.11.0-1016-lowlatency-64k",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1016-lowlatency-64k",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.11-cloud-tools-6.11.0-1016",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.11-headers-6.11.0-1016",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.11-lib-rust-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.11-tools-6.11.0-1016",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-modules-6.11.0-1016-lowlatency-64k",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1016-lowlatency",
"binary_version": "6.11.0-1016.17~24.04.1"
},
{
"binary_name": "linux-tools-6.11.0-1016-lowlatency-64k",
"binary_version": "6.11.0-1016.17~24.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-headers-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-headers-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-nvidia-headers-6.8.0-1046",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-nvidia-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-tools-6.8.0-1046-nvidia",
"binary_version": "6.8.0-1046.49"
},
{
"binary_name": "linux-tools-6.8.0-1046-nvidia-64k",
"binary_version": "6.8.0-1046.49"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-buildinfo-6.11.0-1016-nvidia-64k",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-headers-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-headers-6.11.0-1016-nvidia-64k",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1016-nvidia-64k",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-modules-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-modules-6.11.0-1016-nvidia-64k",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-modules-extra-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-modules-extra-6.11.0-1016-nvidia-64k",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-modules-nvidia-fs-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-modules-nvidia-fs-6.11.0-1016-nvidia-64k",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-nvidia-6.11-headers-6.11.0-1016",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-nvidia-6.11-lib-rust-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-nvidia-6.11-tools-6.11.0-1016",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-tools-6.11.0-1016-nvidia",
"binary_version": "6.11.0-1016.16"
},
{
"binary_name": "linux-tools-6.11.0-1016-nvidia-64k",
"binary_version": "6.11.0-1016.16"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1046-nvidia-lowlatency",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-headers-6.8.0-1046-nvidia-lowlatency",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-headers-6.8.0-1046-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-nvidia-lowlatency",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-modules-6.8.0-1046-nvidia-lowlatency",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-modules-6.8.0-1046-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1046-nvidia-lowlatency",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1046-nvidia-lowlatency",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-modules-nvidia-fs-6.8.0-1046-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-nvidia-lowlatency-headers-6.8.0-1046",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-nvidia-lowlatency-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-tools-6.8.0-1046-nvidia-lowlatency",
"binary_version": "6.8.0-1046.49.1"
},
{
"binary_name": "linux-tools-6.8.0-1046-nvidia-lowlatency-64k",
"binary_version": "6.8.0-1046.49.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1016-nvidia-tegra",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-buildinfo-6.8.0-1016-nvidia-tegra-rt",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-headers-6.8.0-1016-nvidia-tegra",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-headers-6.8.0-1016-nvidia-tegra-rt",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1016-nvidia-tegra",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1016-nvidia-tegra-rt",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-modules-6.8.0-1016-nvidia-tegra",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-modules-6.8.0-1016-nvidia-tegra-rt",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-modules-extra-6.8.0-1016-nvidia-tegra",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-modules-extra-6.8.0-1016-nvidia-tegra-rt",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-nvidia-tegra-headers-6.8.0-1016",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-nvidia-tegra-tools-6.8.0-1016",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-tools-6.8.0-1016-nvidia-tegra",
"binary_version": "6.8.0-1016.16"
},
{
"binary_name": "linux-tools-6.8.0-1016-nvidia-tegra-rt",
"binary_version": "6.8.0-1016.16"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-headers-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-image-unsigned-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-modules-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-modules-ipu6-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-modules-ipu7-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-modules-iwlwifi-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-modules-usbio-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-modules-vision-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-oem-6.11-headers-6.11.0-1027",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-oem-6.11-tools-6.11.0-1027",
"binary_version": "6.11.0-1027.27"
},
{
"binary_name": "linux-tools-6.11.0-1027-oem",
"binary_version": "6.11.0-1027.27"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-headers-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-modules-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-modules-ipu6-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-modules-usbio-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-oem-6.8-headers-6.8.0-1032",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-oem-6.8-tools-6.8.0-1032",
"binary_version": "6.8.0-1032.32"
},
{
"binary_name": "linux-tools-6.8.0-1032-oem",
"binary_version": "6.8.0-1032.32"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-buildinfo-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-headers-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-headers-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-modules-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-modules-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-modules-extra-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-oracle-headers-6.8.0-1043",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-oracle-tools-6.8.0-1043",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-tools-6.8.0-1043-oracle",
"binary_version": "6.8.0-1043.44"
},
{
"binary_name": "linux-tools-6.8.0-1043-oracle-64k",
"binary_version": "6.8.0-1043.44"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1047-raspi",
"binary_version": "6.8.0-1047.51"
},
{
"binary_name": "linux-headers-6.8.0-1047-raspi",
"binary_version": "6.8.0-1047.51"
},
{
"binary_name": "linux-image-6.8.0-1047-raspi",
"binary_version": "6.8.0-1047.51"
},
{
"binary_name": "linux-modules-6.8.0-1047-raspi",
"binary_version": "6.8.0-1047.51"
},
{
"binary_name": "linux-raspi-headers-6.8.0-1047",
"binary_version": "6.8.0-1047.51"
},
{
"binary_name": "linux-raspi-tools-6.8.0-1047",
"binary_version": "6.8.0-1047.51"
},
{
"binary_name": "linux-tools-6.8.0-1047-raspi",
"binary_version": "6.8.0-1047.51"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-headers-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-image-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-modules-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-raspi-realtime-headers-6.8.0-2019",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-raspi-realtime-tools-6.8.0-2019",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-tools-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-cloud-tools-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-headers-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-image-unsigned-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-modules-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-modules-extra-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-realtime-cloud-tools-6.8.1-1015",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-realtime-headers-6.8.1-1015",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-realtime-tools-6.8.1-1015",
"binary_version": "6.8.1-1015.16"
},
{
"binary_name": "linux-tools-6.8.1-1015-realtime",
"binary_version": "6.8.1-1015.16"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-60-generic",
"binary_version": "6.8.0-60.63.1"
},
{
"binary_name": "linux-headers-6.8.0-60-generic",
"binary_version": "6.8.0-60.63.1"
},
{
"binary_name": "linux-image-6.8.0-60-generic",
"binary_version": "6.8.0-60.63.1"
},
{
"binary_name": "linux-modules-6.8.0-60-generic",
"binary_version": "6.8.0-60.63.1"
},
{
"binary_name": "linux-riscv-headers-6.8.0-60",
"binary_version": "6.8.0-60.63.1"
},
{
"binary_name": "linux-riscv-tools-6.8.0-60",
"binary_version": "6.8.0-60.63.1"
},
{
"binary_name": "linux-tools-6.8.0-60-generic",
"binary_version": "6.8.0-60.63.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1022-xilinx",
"binary_version": "6.8.0-1022.23"
},
{
"binary_name": "linux-headers-6.8.0-1022-xilinx",
"binary_version": "6.8.0-1022.23"
},
{
"binary_name": "linux-image-6.8.0-1022-xilinx",
"binary_version": "6.8.0-1022.23"
},
{
"binary_name": "linux-modules-6.8.0-1022-xilinx",
"binary_version": "6.8.0-1022.23"
},
{
"binary_name": "linux-tools-6.8.0-1022-xilinx",
"binary_version": "6.8.0-1022.23"
},
{
"binary_name": "linux-xilinx-headers-6.8.0-1022",
"binary_version": "6.8.0-1022.23"
},
{
"binary_name": "linux-xilinx-tools-6.8.0-1022",
"binary_version": "6.8.0-1022.23"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fde-cloud-tools-6.17.0-1005",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-azure-fde-headers-6.17.0-1005",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-azure-fde-tools-6.17.0-1005",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-buildinfo-6.17.0-1005-azure-fde",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-cloud-tools-6.17.0-1005-azure-fde",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-headers-6.17.0-1005-azure-fde",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-image-unsigned-6.17.0-1005-azure-fde",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-modules-6.17.0-1005-azure-fde",
"binary_version": "6.17.0-1005.5"
},
{
"binary_name": "linux-tools-6.17.0-1005-azure-fde",
"binary_version": "6.17.0-1005.5"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available for NVIDIA BlueField platforms",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-bluefield-cloud-tools-common",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-bluefield-headers-5.15.0-1072",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-bluefield-tools-5.15.0-1072",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-bluefield-tools-host",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-buildinfo-5.15.0-1072-bluefield",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-headers-5.15.0-1072-bluefield",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1072-bluefield",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-modules-5.15.0-1072-bluefield",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-modules-extra-5.15.0-1072-bluefield",
"binary_version": "5.15.0-1072.74"
},
{
"binary_name": "linux-tools-5.15.0-1072-bluefield",
"binary_version": "5.15.0-1072.74"
}
]
}{
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.4.0-1151",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-aws-headers-4.4.0-1151",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-aws-tools-4.4.0-1151",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-buildinfo-4.4.0-1151-aws",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1151-aws",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-headers-4.4.0-1151-aws",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-image-4.4.0-1151-aws",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-modules-4.4.0-1151-aws",
"binary_version": "4.4.0-1151.157"
},
{
"binary_name": "linux-tools-4.4.0-1151-aws",
"binary_version": "4.4.0-1151.157"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-4.15.0-1196",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-azure-headers-4.15.0-1196",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-azure-tools-4.15.0-1196",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~14.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~14.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "crypto-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "fat-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "fb-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "firewire-core-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "floppy-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "fs-core-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "fs-secondary-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "input-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "ipmi-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "irda-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "kernel-image-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-277",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-image-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-lts-xenial-cloud-tools-4.4.0-277",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-lts-xenial-tools-4.4.0-277",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-lts-xenial-udebs-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-modules-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-modules-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-modules-extra-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-tools-4.4.0-277-generic",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "linux-tools-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "md-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "message-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "mouse-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "multipath-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "nfs-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "nic-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "nic-shared-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "nic-usb-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "parport-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "pata-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "pcmcia-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "plip-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "ppp-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "sata-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "scsi-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "serial-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "speakup-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "storage-core-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "usb-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "virtio-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
},
{
"binary_name": "vlan-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311~14.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "crypto-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "dasd-extra-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "dasd-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "fat-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "fb-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "firewire-core-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "floppy-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "fs-core-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "fs-secondary-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "input-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "ipmi-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "irda-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "kernel-image-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-buildinfo-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-buildinfo-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-cloud-tools-4.4.0-277",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-cloud-tools-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-cloud-tools-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-headers-4.4.0-277",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-headers-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-headers-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-image-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-image-unsigned-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-image-unsigned-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-modules-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-modules-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-modules-extra-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-source-4.4.0",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-tools-4.4.0-277",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-tools-4.4.0-277-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-tools-4.4.0-277-lowlatency",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "md-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "message-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "mouse-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "multipath-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "nfs-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "nic-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "nic-shared-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "nic-usb-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "parport-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "pata-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "pcmcia-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "plip-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "ppp-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "sata-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "scsi-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "serial-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "speakup-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "storage-core-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "usb-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "virtio-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
},
{
"binary_name": "vlan-modules-4.4.0-277-generic-di",
"binary_version": "4.4.0-277.311"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.4.0-1189",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-aws-headers-4.4.0-1189",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-aws-tools-4.4.0-1189",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-buildinfo-4.4.0-1189-aws",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1189-aws",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-headers-4.4.0-1189-aws",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-image-4.4.0-1189-aws",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-modules-4.4.0-1189-aws",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-modules-extra-4.4.0-1189-aws",
"binary_version": "4.4.0-1189.204"
},
{
"binary_name": "linux-tools-4.4.0-1189-aws",
"binary_version": "4.4.0-1189.204"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-headers-4.15.0-1188",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1188",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-aws-hwe-tools-4.15.0-1188",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201~16.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-4.15.0-1196",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-azure-headers-4.15.0-1196",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-azure-tools-4.15.0-1196",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211~16.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198~16.04.1"
},
{
"binary_name": "linux-gcp-headers-4.15.0-1181",
"binary_version": "4.15.0-1181.198~16.04.1"
},
{
"binary_name": "linux-gcp-tools-4.15.0-1181",
"binary_version": "4.15.0-1181.198~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198~16.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "dasd-extra-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "dasd-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "fb-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "firewire-core-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "floppy-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-246",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-hwe-cloud-tools-4.15.0-246",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-hwe-tools-4.15.0-246",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-hwe-udebs-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-246-generic",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "message-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "pata-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "pcmcia-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "serial-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "virtio-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258~16.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.4.0-1152-kvm",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1152-kvm",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-headers-4.4.0-1152-kvm",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-image-4.4.0-1152-kvm",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-kvm-cloud-tools-4.4.0-1152",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-kvm-headers-4.4.0-1152",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-kvm-tools-4.4.0-1152",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-modules-4.4.0-1152-kvm",
"binary_version": "4.4.0-1152.163"
},
{
"binary_name": "linux-tools-4.4.0-1152-kvm",
"binary_version": "4.4.0-1152.163"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161~16.04.1"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1150",
"binary_version": "4.15.0-1150.161~16.04.1"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1150",
"binary_version": "4.15.0-1150.161~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161~16.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "crypto-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "dasd-extra-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "dasd-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "fat-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "fb-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "firewire-core-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "floppy-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "fs-core-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "fs-secondary-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "input-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "ipmi-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "irda-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "kernel-image-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-buildinfo-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-buildinfo-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-cloud-tools-4.15.0-246",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-cloud-tools-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-cloud-tools-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-headers-4.15.0-246",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-headers-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-headers-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-image-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-image-unsigned-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-image-unsigned-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-modules-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-modules-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-modules-extra-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-tools-4.15.0-246",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-tools-4.15.0-246-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-tools-4.15.0-246-lowlatency",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "md-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "message-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "mouse-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "multipath-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "nfs-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "nic-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "nic-shared-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "nic-usb-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "parport-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "pata-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "pcmcia-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "plip-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "ppp-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "sata-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "scsi-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "serial-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "storage-core-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "usb-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "virtio-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
},
{
"binary_name": "vlan-modules-4.15.0-246-generic-di",
"binary_version": "4.15.0-246.258"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.15.0-1188",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-aws-headers-4.15.0-1188",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-aws-tools-4.15.0-1188",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-buildinfo-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-headers-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-modules-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-modules-extra-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201"
},
{
"binary_name": "linux-tools-4.15.0-1188-aws",
"binary_version": "4.15.0-1188.201"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-aws-5.4-headers-5.4.0-1154",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-aws-5.4-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1196",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-azure-4.15-headers-4.15.0-1196",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-azure-4.15-tools-4.15.0-1196",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-buildinfo-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-headers-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-modules-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-modules-extra-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211"
},
{
"binary_name": "linux-tools-4.15.0-1196-azure",
"binary_version": "4.15.0-1196.211"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1157",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-azure-5.4-headers-5.4.0-1157",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-azure-5.4-tools-5.4.0-1157",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198"
},
{
"binary_name": "linux-gcp-4.15-headers-4.15.0-1181",
"binary_version": "4.15.0-1181.198"
},
{
"binary_name": "linux-gcp-4.15-tools-4.15.0-1181",
"binary_version": "4.15.0-1181.198"
},
{
"binary_name": "linux-headers-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198"
},
{
"binary_name": "linux-modules-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198"
},
{
"binary_name": "linux-modules-extra-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198"
},
{
"binary_name": "linux-tools-4.15.0-1181-gcp",
"binary_version": "4.15.0-1181.198"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-headers-5.4.0-1157",
"binary_version": "5.4.0-1157.166~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-tools-5.4.0-1157",
"binary_version": "5.4.0-1157.166~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "crypto-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "dasd-extra-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "dasd-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "fat-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "fb-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "firewire-core-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "floppy-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "fs-core-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "fs-secondary-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "input-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "ipmi-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "kernel-image-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-225-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-225-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-225-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-225",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-cloud-tools-common",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-headers-5.4.0-225",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-source-5.4.0",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-tools-5.4.0-225",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-tools-common",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-udebs-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-225-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-225-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-225-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-225-generic",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "md-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "message-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "mouse-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "multipath-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "nfs-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "nic-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "nic-shared-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "nic-usb-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "parport-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "pata-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "pcmcia-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "plip-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "ppp-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "sata-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "scsi-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "serial-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "storage-core-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "usb-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "virtio-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
},
{
"binary_name": "vlan-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-cloud-tools-common",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-headers-5.4.0-1100",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-source-5.4.0",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-5.4.0-1100",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-common",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1170-kvm",
"binary_version": "4.15.0-1170.175"
},
{
"binary_name": "linux-headers-4.15.0-1170-kvm",
"binary_version": "4.15.0-1170.175"
},
{
"binary_name": "linux-image-4.15.0-1170-kvm",
"binary_version": "4.15.0-1170.175"
},
{
"binary_name": "linux-kvm-headers-4.15.0-1170",
"binary_version": "4.15.0-1170.175"
},
{
"binary_name": "linux-kvm-tools-4.15.0-1170",
"binary_version": "4.15.0-1170.175"
},
{
"binary_name": "linux-modules-4.15.0-1170-kvm",
"binary_version": "4.15.0-1170.175"
},
{
"binary_name": "linux-tools-4.15.0-1170-kvm",
"binary_version": "4.15.0-1170.175"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161"
},
{
"binary_name": "linux-headers-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161"
},
{
"binary_name": "linux-modules-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161"
},
{
"binary_name": "linux-modules-extra-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1150",
"binary_version": "4.15.0-1150.161"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1150",
"binary_version": "4.15.0-1150.161"
},
{
"binary_name": "linux-tools-4.15.0-1150-oracle",
"binary_version": "4.15.0-1150.161"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162~18.04.1"
},
{
"binary_name": "linux-oracle-5.4-headers-5.4.0-1152",
"binary_version": "5.4.0-1152.162~18.04.1"
},
{
"binary_name": "linux-oracle-5.4-tools-5.4.0-1152",
"binary_version": "5.4.0-1152.162~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149~18.04.1"
},
{
"binary_name": "linux-image-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-headers-5.4.0-1136",
"binary_version": "5.4.0-1136.149~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-tools-5.4.0-1136",
"binary_version": "5.4.0-1136.149~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149~18.04.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "block-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "crypto-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "crypto-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "dasd-extra-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "dasd-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "fat-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "fat-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "fb-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "firewire-core-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "floppy-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "fs-core-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "fs-core-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "fs-secondary-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "fs-secondary-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "input-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "input-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "ipmi-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "ipmi-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "kernel-image-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "kernel-image-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-buildinfo-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-buildinfo-5.4.0-225-generic-lpae",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-buildinfo-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-cloud-tools-5.4.0-225",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-cloud-tools-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-cloud-tools-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-headers-5.4.0-225",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-headers-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-headers-5.4.0-225-generic-lpae",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-headers-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-image-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-image-5.4.0-225-generic-lpae",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-image-unsigned-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-image-unsigned-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-modules-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-modules-5.4.0-225-generic-lpae",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-modules-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-modules-extra-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-source-5.4.0",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-tools-5.4.0-225",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-tools-5.4.0-225-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-tools-5.4.0-225-generic-lpae",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-tools-5.4.0-225-lowlatency",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-tools-common",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-tools-host",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "linux-udebs-generic-lpae",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "md-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "md-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "message-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "mouse-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "mouse-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "multipath-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "multipath-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nfs-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nfs-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nic-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nic-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nic-pcmcia-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nic-shared-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nic-shared-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nic-usb-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "nic-usb-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "parport-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "parport-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "pata-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "pcmcia-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "pcmcia-storage-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "plip-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "plip-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "ppp-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "ppp-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "sata-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "sata-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "scsi-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "scsi-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "serial-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "storage-core-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "storage-core-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "usb-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "usb-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "virtio-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "vlan-modules-5.4.0-225-generic-di",
"binary_version": "5.4.0-225.245"
},
{
"binary_name": "vlan-modules-5.4.0-225-generic-lpae-di",
"binary_version": "5.4.0-225.245"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-aws-headers-5.4.0-1154",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-aws-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-buildinfo-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-headers-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-modules-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-modules-extra-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164"
},
{
"binary_name": "linux-tools-5.4.0-1154-aws",
"binary_version": "5.4.0-1154.164"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-aws-5.15-headers-5.15.0-1088",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-aws-5.15-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1088-aws",
"binary_version": "5.15.0-1088.95~20.04.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.4.0-1157",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-azure-headers-5.4.0-1157",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-azure-tools-5.4.0-1157",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-buildinfo-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-headers-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-modules-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-modules-extra-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164"
},
{
"binary_name": "linux-tools-5.4.0-1157-azure",
"binary_version": "5.4.0-1157.164"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1094",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-azure-5.15-headers-5.15.0-1094",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-azure-5.15-tools-5.15.0-1094",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-modules-involflt-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1094-azure",
"binary_version": "5.15.0-1094.103~20.04.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-bluefield-headers-5.4.0-1112",
"binary_version": "5.4.0-1112.119"
},
{
"binary_name": "linux-bluefield-tools-5.4.0-1112",
"binary_version": "5.4.0-1112.119"
},
{
"binary_name": "linux-buildinfo-5.4.0-1112-bluefield",
"binary_version": "5.4.0-1112.119"
},
{
"binary_name": "linux-headers-5.4.0-1112-bluefield",
"binary_version": "5.4.0-1112.119"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1112-bluefield",
"binary_version": "5.4.0-1112.119"
},
{
"binary_name": "linux-modules-5.4.0-1112-bluefield",
"binary_version": "5.4.0-1112.119"
},
{
"binary_name": "linux-tools-5.4.0-1112-bluefield",
"binary_version": "5.4.0-1112.119"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166"
},
{
"binary_name": "linux-gcp-headers-5.4.0-1157",
"binary_version": "5.4.0-1157.166"
},
{
"binary_name": "linux-gcp-tools-5.4.0-1157",
"binary_version": "5.4.0-1157.166"
},
{
"binary_name": "linux-headers-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166"
},
{
"binary_name": "linux-modules-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166"
},
{
"binary_name": "linux-modules-extra-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166"
},
{
"binary_name": "linux-tools-5.4.0-1157-gcp",
"binary_version": "5.4.0-1157.166"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-gcp-5.15-headers-5.15.0-1087",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-gcp-5.15-tools-5.15.0-1087",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-headers-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-modules-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-modules-extra-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96~20.04.2"
},
{
"binary_name": "linux-tools-5.15.0-1087-gcp",
"binary_version": "5.15.0-1087.96~20.04.2"
}
]
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-144",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-headers-5.15.0-144",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-tools-5.15.0-144",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-144-generic",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-144-generic-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-144-generic-lpae",
"binary_version": "5.15.0-144.157~20.04.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-headers-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-ibm-cloud-tools-common",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-ibm-headers-5.4.0-1100",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-ibm-source-5.4.0",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-ibm-tools-5.4.0-1100",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-ibm-tools-common",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-modules-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-modules-extra-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105"
},
{
"binary_name": "linux-tools-5.4.0-1100-ibm",
"binary_version": "5.4.0-1100.105"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-ibm-5.15-headers-5.15.0-1080",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-ibm-5.15-source-5.15.0",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-ibm-5.15-tools-5.15.0-1080",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1080-ibm",
"binary_version": "5.15.0-1080.83~20.04.1"
}
]
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-cloud-tools-common",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1083",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-common",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-host",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1083-intel-iotg",
"binary_version": "5.15.0-1083.89~20.04.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1058-iot",
"binary_version": "5.4.0-1058.61"
},
{
"binary_name": "linux-headers-5.4.0-1058-iot",
"binary_version": "5.4.0-1058.61"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1058-iot",
"binary_version": "5.4.0-1058.61"
},
{
"binary_name": "linux-iot-headers-5.4.0-1058",
"binary_version": "5.4.0-1058.61"
},
{
"binary_name": "linux-iot-tools-5.4.0-1058",
"binary_version": "5.4.0-1058.61"
},
{
"binary_name": "linux-modules-5.4.0-1058-iot",
"binary_version": "5.4.0-1058.61"
},
{
"binary_name": "linux-tools-5.4.0-1058-iot",
"binary_version": "5.4.0-1058.61"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1141-kvm",
"binary_version": "5.4.0-1141.150"
},
{
"binary_name": "linux-headers-5.4.0-1141-kvm",
"binary_version": "5.4.0-1141.150"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1141-kvm",
"binary_version": "5.4.0-1141.150"
},
{
"binary_name": "linux-kvm-headers-5.4.0-1141",
"binary_version": "5.4.0-1141.150"
},
{
"binary_name": "linux-kvm-tools-5.4.0-1141",
"binary_version": "5.4.0-1141.150"
},
{
"binary_name": "linux-modules-5.4.0-1141-kvm",
"binary_version": "5.4.0-1141.150"
},
{
"binary_name": "linux-tools-5.4.0-1141-kvm",
"binary_version": "5.4.0-1141.150"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-144",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-144",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-144",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-144-lowlatency",
"binary_version": "5.15.0-144.157~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-144-lowlatency-64k",
"binary_version": "5.15.0-144.157~20.04.1"
}
]
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1041",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1041",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1041-nvidia-tegra",
"binary_version": "5.15.0-1041.41~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1041-nvidia-tegra-rt",
"binary_version": "5.15.0-1041.41~20.04.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162"
},
{
"binary_name": "linux-headers-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162"
},
{
"binary_name": "linux-modules-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162"
},
{
"binary_name": "linux-modules-extra-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162"
},
{
"binary_name": "linux-oracle-headers-5.4.0-1152",
"binary_version": "5.4.0-1152.162"
},
{
"binary_name": "linux-oracle-tools-5.4.0-1152",
"binary_version": "5.4.0-1152.162"
},
{
"binary_name": "linux-tools-5.4.0-1152-oracle",
"binary_version": "5.4.0-1152.162"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91~20.04.3"
},
{
"binary_name": "linux-headers-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91~20.04.3"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91~20.04.3"
},
{
"binary_name": "linux-modules-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91~20.04.3"
},
{
"binary_name": "linux-modules-extra-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91~20.04.3"
},
{
"binary_name": "linux-oracle-5.15-headers-5.15.0-1085",
"binary_version": "5.15.0-1085.91~20.04.3"
},
{
"binary_name": "linux-oracle-5.15-tools-5.15.0-1085",
"binary_version": "5.15.0-1085.91~20.04.3"
},
{
"binary_name": "linux-tools-5.15.0-1085-oracle",
"binary_version": "5.15.0-1085.91~20.04.3"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149"
},
{
"binary_name": "linux-headers-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149"
},
{
"binary_name": "linux-image-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149"
},
{
"binary_name": "linux-modules-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149"
},
{
"binary_name": "linux-raspi-headers-5.4.0-1136",
"binary_version": "5.4.0-1136.149"
},
{
"binary_name": "linux-raspi-tools-5.4.0-1136",
"binary_version": "5.4.0-1136.149"
},
{
"binary_name": "linux-tools-5.4.0-1136-raspi",
"binary_version": "5.4.0-1136.149"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1083-generic",
"binary_version": "5.15.0-1083.87~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1083-generic",
"binary_version": "5.15.0-1083.87~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-1083-generic",
"binary_version": "5.15.0-1083.87~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1083-generic",
"binary_version": "5.15.0-1083.87~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1083-generic",
"binary_version": "5.15.0-1083.87~20.04.1"
},
{
"binary_name": "linux-riscv-5.15-headers-5.15.0-1083",
"binary_version": "5.15.0-1083.87~20.04.1"
},
{
"binary_name": "linux-riscv-5.15-tools-5.15.0-1083",
"binary_version": "5.15.0-1083.87~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1083-generic",
"binary_version": "5.15.0-1083.87~20.04.1"
}
]
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1072-xilinx-zynqmp",
"binary_version": "5.4.0-1072.76"
},
{
"binary_name": "linux-headers-5.4.0-1072-xilinx-zynqmp",
"binary_version": "5.4.0-1072.76"
},
{
"binary_name": "linux-image-5.4.0-1072-xilinx-zynqmp",
"binary_version": "5.4.0-1072.76"
},
{
"binary_name": "linux-modules-5.4.0-1072-xilinx-zynqmp",
"binary_version": "5.4.0-1072.76"
},
{
"binary_name": "linux-tools-5.4.0-1072-xilinx-zynqmp",
"binary_version": "5.4.0-1072.76"
},
{
"binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1072",
"binary_version": "5.4.0-1072.76"
},
{
"binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1072",
"binary_version": "5.4.0-1072.76"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-fips-cloud-tools-5.15.0-1051",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-aws-fips-headers-5.15.0-1051",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-aws-fips-tools-5.15.0-1051",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1051-aws-fips",
"binary_version": "5.15.0-1051.56+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.15.0-1053",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.15.0-1053",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.15.0-1053",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1053-azure-fips",
"binary_version": "5.15.0-1053.61+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-fips-headers-5.15.0-73",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-fips-tools-5.15.0-73",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-headers-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-modules-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
},
{
"binary_name": "linux-tools-5.15.0-73-fips",
"binary_version": "5.15.0-73.80+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.15.0-1048",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.15.0-1048",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1048-gcp-fips",
"binary_version": "5.15.0-1048.56+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-fips-headers-4.15.0-2126",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-aws-fips-tools-4.15.0-2126",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-buildinfo-4.15.0-2126-aws-fips",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-headers-4.15.0-2126-aws-fips",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2126-aws-fips",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2126-aws-fips",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-modules-4.15.0-2126-aws-fips",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-modules-extra-4.15.0-2126-aws-fips",
"binary_version": "4.15.0-2126.132"
},
{
"binary_name": "linux-tools-4.15.0-2126-aws-fips",
"binary_version": "4.15.0-2126.132"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-2105",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-azure-fips-headers-4.15.0-2105",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-azure-fips-tools-4.15.0-2105",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-buildinfo-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-cloud-tools-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-headers-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-modules-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-modules-extra-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
},
{
"binary_name": "linux-tools-4.15.0-2105-azure-fips",
"binary_version": "4.15.0-2105.111"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-fips-headers-4.15.0-1143",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-fips-tools-4.15.0-1143",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-headers-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-image-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-image-hmac-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-modules-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-modules-extra-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
},
{
"binary_name": "linux-tools-4.15.0-1143-fips",
"binary_version": "4.15.0-1143.155"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-2089-gcp-fips",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-gcp-fips-headers-4.15.0-2089",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-gcp-fips-tools-4.15.0-2089",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-headers-4.15.0-2089-gcp-fips",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2089-gcp-fips",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2089-gcp-fips",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-modules-4.15.0-2089-gcp-fips",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-modules-extra-4.15.0-2089-gcp-fips",
"binary_version": "4.15.0-2089.95"
},
{
"binary_name": "linux-tools-4.15.0-2089-gcp-fips",
"binary_version": "4.15.0-2089.95"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-fips-headers-5.4.0-1154",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-aws-fips-tools-5.4.0-1154",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1154-aws-fips",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1154-aws-fips",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1154-aws-fips",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1154-aws-fips",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1154-aws-fips",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1154-aws-fips",
"binary_version": "5.4.0-1154.164+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1154-aws-fips",
"binary_version": "5.4.0-1154.164+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1158",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.4.0-1158",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.4.0-1158",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1158-azure-fips",
"binary_version": "5.4.0-1158.165+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1128-fips",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-fips-headers-5.4.0-1128",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-fips-tools-5.4.0-1128",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-headers-5.4.0-1128-fips",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1128-fips",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1128-fips",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-modules-5.4.0-1128-fips",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-modules-extra-5.4.0-1128-fips",
"binary_version": "5.4.0-1128.138"
},
{
"binary_name": "linux-tools-5.4.0-1128-fips",
"binary_version": "5.4.0-1128.138"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1157-gcp-fips",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.4.0-1157",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.4.0-1157",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1157-gcp-fips",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1157-gcp-fips",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1157-gcp-fips",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1157-gcp-fips",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1157-gcp-fips",
"binary_version": "5.4.0-1157.166+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1157-gcp-fips",
"binary_version": "5.4.0-1157.166+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-aws-fips-cloud-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-aws-fips-headers-5.15.0-1088",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-aws-fips-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1088-aws-fips",
"binary_version": "5.15.0-1088.95+fips1"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.15.0-1094",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.15.0-1094",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.15.0-1094",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-modules-involflt-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1094-azure-fips",
"binary_version": "5.15.0-1094.103+fips1"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-fips-headers-5.15.0-144",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-fips-tools-5.15.0-144",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-headers-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-modules-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
},
{
"binary_name": "linux-tools-5.15.0-144-fips",
"binary_version": "5.15.0-144.157+fips1"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1087-gcp-fips",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.15.0-1087",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.15.0-1087",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-headers-5.15.0-1087-gcp-fips",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1087-gcp-fips",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.15.0-1087-gcp-fips",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-modules-5.15.0-1087-gcp-fips",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1087-gcp-fips",
"binary_version": "5.15.0-1087.96+fips1"
},
{
"binary_name": "linux-tools-5.15.0-1087-gcp-fips",
"binary_version": "5.15.0-1087.96+fips1"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-aws-fips-cloud-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-aws-fips-headers-6.8.0-1046",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-aws-fips-tools-6.8.0-1046",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-headers-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-modules-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
},
{
"binary_name": "linux-tools-6.8.0-1046-aws-fips",
"binary_version": "6.8.0-1046.49+fips1"
}
]
}{
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-azure-fips-headers-6.8.0-1044",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-azure-fips-tools-6.8.0-1044",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-buildinfo-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-headers-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-modules-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-modules-involflt-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
},
{
"binary_name": "linux-tools-6.8.0-1044-azure-fips",
"binary_version": "6.8.0-1044.50+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-cloud-tools-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-fips-cloud-tools-6.8.0-100",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-fips-headers-6.8.0-100",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-fips-lib-rust-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-fips-tools-6.8.0-100",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-headers-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-image-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-image-hmac-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-modules-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-modules-extra-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-modules-ipu6-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-modules-usbio-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
},
{
"binary_name": "linux-tools-6.8.0-100-fips",
"binary_version": "6.8.0-100.100+fips1"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-1047-gcp-fips",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-6.8.0-1047",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-6.8.0-1047",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-headers-6.8.0-1047-gcp-fips",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-image-unsigned-6.8.0-1047-gcp-fips",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-6.8.0-1047-gcp-fips",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-modules-6.8.0-1047-gcp-fips",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-modules-extra-6.8.0-1047-gcp-fips",
"binary_version": "6.8.0-1047.50+fips1"
},
{
"binary_name": "linux-tools-6.8.0-1047-gcp-fips",
"binary_version": "6.8.0-1047.50+fips1"
}
]
}{
"binaries": [
{
"binary_name": "block-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "crypto-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "dasd-extra-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "dasd-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "fat-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "fb-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "firewire-core-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "floppy-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "fs-core-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "fs-secondary-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "input-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "ipmi-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "irda-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "kernel-image-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-buildinfo-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-fips-cloud-tools-common",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-fips-headers-4.4.0-1121",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-fips-source-4.4.0",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-fips-tools-4.4.0-1121",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-headers-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-image-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-image-hmac-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-image-unsigned-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-image-unsigned-hmac-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-modules-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-modules-extra-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-tools-4.4.0-1121-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "linux-udebs-fips",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "md-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "message-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "mouse-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "multipath-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "nfs-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "nic-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "nic-shared-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "nic-usb-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "parport-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "pata-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "pcmcia-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "plip-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "ppp-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "sata-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "scsi-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "serial-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "speakup-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "storage-core-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "usb-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "virtio-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
},
{
"binary_name": "vlan-modules-4.4.0-1121-fips-di",
"binary_version": "4.4.0-1121.128"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "block-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "crypto-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "dasd-extra-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "dasd-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fat-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "firewire-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "floppy-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fs-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fs-secondary-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "input-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "ipmi-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "irda-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "kernel-image-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-headers-4.4.0-1002",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-source-4.4.0",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-tools-4.4.0-1002",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-headers-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-extra-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-hmac-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-tools-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-udebs-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "md-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "message-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "mouse-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "multipath-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nfs-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-shared-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-usb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "parport-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pata-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pcmcia-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "plip-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "ppp-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "sata-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "scsi-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "serial-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "speakup-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "storage-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "usb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "virtio-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "vlan-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-fips-headers-4.15.0-2000",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-aws-fips-tools-4.15.0-2000",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-buildinfo-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-headers-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-modules-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-modules-extra-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-tools-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-azure-fips-headers-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-azure-fips-tools-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-buildinfo-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-headers-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-modules-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-modules-extra-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-tools-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-headers-4.15.0-1011",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-tools-4.15.0-1011",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-headers-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-hmac-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-modules-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-modules-extra-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-tools-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-gcp-fips-headers-4.15.0-1001",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-gcp-fips-tools-4.15.0-1001",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-headers-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-modules-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-tools-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-aws-fips-headers-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-aws-fips-tools-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-buildinfo-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-headers-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-modules-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-modules-extra-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-tools-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-headers-5.4.0-1007",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-tools-5.4.0-1007",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-headers-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-modules-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-modules-extra-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-tools-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
}
],
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users."
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1081-intel-iot-realtime",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1081-intel-iot-realtime",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-headers-5.15.0-1081-intel-iot-realtime",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1081-intel-iot-realtime",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1081",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-common",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-intel-iot-realtime-headers-5.15.0-1081",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-intel-iot-realtime-tools-5.15.0-1081",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-intel-iot-realtime-tools-common",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-intel-iot-realtime-tools-host",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-modules-5.15.0-1081-intel-iot-realtime",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-modules-extra-5.15.0-1081-intel-iot-realtime",
"binary_version": "5.15.0-1081.83"
},
{
"binary_name": "linux-tools-5.15.0-1081-intel-iot-realtime",
"binary_version": "5.15.0-1081.83"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-headers-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-modules-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-modules-extra-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-realtime-cloud-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-realtime-cloud-tools-common",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-realtime-headers-5.15.0-1088",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-realtime-tools-5.15.0-1088",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-realtime-tools-common",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-realtime-tools-host",
"binary_version": "5.15.0-1088.97"
},
{
"binary_name": "linux-tools-5.15.0-1088-realtime",
"binary_version": "5.15.0-1088.97"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-headers-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-modules-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-realtime-6.8-cloud-tools-6.8.1-1041",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-realtime-6.8-headers-6.8.1-1041",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-realtime-6.8-tools-6.8.1-1041",
"binary_version": "6.8.1-1041.42~22.04.1"
},
{
"binary_name": "linux-tools-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42~22.04.1"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-2037-raspi-realtime",
"binary_version": "6.8.0-2037.38"
},
{
"binary_name": "linux-headers-6.8.0-2037-raspi-realtime",
"binary_version": "6.8.0-2037.38"
},
{
"binary_name": "linux-image-6.8.0-2037-raspi-realtime",
"binary_version": "6.8.0-2037.38"
},
{
"binary_name": "linux-modules-6.8.0-2037-raspi-realtime",
"binary_version": "6.8.0-2037.38"
},
{
"binary_name": "linux-raspi-realtime-headers-6.8.0-2037",
"binary_version": "6.8.0-2037.38"
},
{
"binary_name": "linux-raspi-realtime-tools-6.8.0-2037",
"binary_version": "6.8.0-2037.38"
},
{
"binary_name": "linux-tools-6.8.0-2037-raspi-realtime",
"binary_version": "6.8.0-2037.38"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-cloud-tools-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-headers-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-image-unsigned-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-modules-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-modules-extra-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-modules-iwlwifi-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-realtime-cloud-tools-6.8.1-1041",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-realtime-headers-6.8.1-1041",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-realtime-tools-6.8.1-1041",
"binary_version": "6.8.1-1041.42"
},
{
"binary_name": "linux-tools-6.8.1-1041-realtime",
"binary_version": "6.8.1-1041.42"
}
]
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability is a use-after-free that requires local access and two distinct privileges: the ability to create a KVM VM and permissions to assign a physical device via VFIO. This kind of capabilities is usually restricted to root users.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-cloud-tools-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-realtime-6.14-cloud-tools-6.14.0-1010",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-realtime-6.14-headers-6.14.0-1010",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-realtime-6.14-tools-6.14.0-1010",
"binary_version": "6.14.0-1010.10~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1010-realtime",
"binary_version": "6.14.0-1010.10~24.04.1"
}
]
}