Search CVE reports
71 – 80 of 25459 results
CVE-2024-53043
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: mctp i2c: handle NULL header address daddr can be NULL if there is no neighbour table entry present, in that case the tx packet should be dropped. saddr will...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Not affected |
linux-allwinner-5.19 | Ignored |
linux-aws | Not affected |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Not affected |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Not affected |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Not affected |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Not affected |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Not affected |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Not affected |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Not affected |
linux-lowlatency | Not affected |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Not affected |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Not affected |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Not affected |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Not affected |
CVE-2024-53042
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() There are code paths from which the function is called without holding the RCU read...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-50304
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() The per-netns IP tunnel hash table is protected by the RTNL mutex and ip_tunnel_find() is...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-50303
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: resource,kexec: walk_system_ram_res_rev must retain resource flags walk_system_ram_res_rev() erroneously discards resource flags when passing the information to...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Not affected |
linux-allwinner-5.19 | Ignored |
linux-aws | Not affected |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Not affected |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Not affected |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Not affected |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Not affected |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Not affected |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Not affected |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Not affected |
linux-lowlatency | Not affected |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Not affected |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Not affected |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Not affected |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Not affected |
CVE-2024-48992
High priorityQualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
1 affected packages
needrestart
Package | 22.04 LTS |
---|---|
needrestart | Fixed |
CVE-2024-48991
High priorityQualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the...
1 affected packages
needrestart
Package | 22.04 LTS |
---|---|
needrestart | Fixed |
CVE-2024-48990
High priorityQualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
1 affected packages
needrestart
Package | 22.04 LTS |
---|---|
needrestart | Fixed |
CVE-2024-11003
Medium priorityQualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see...
1 affected packages
needrestart
Package | 22.04 LTS |
---|---|
needrestart | Fixed |
CVE-2024-10224
Medium priorityQualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|"...
1 affected packages
libmodule-scandeps-perl
Package | 22.04 LTS |
---|---|
libmodule-scandeps-perl | Fixed |
CVE-2024-50302
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |