Linux Kernel Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Last Year

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Version

6.6.0931
6.6.1931
6.6.2891
6.1.0817
6.1.1817

Grouping all affected versions of a specific product helps to determine existing issues. This makes it possible to determine vendors and products which need attention when it comes to remediations.

Remediation

Official Fix4774
Temporary Fix0
Workaround11
Unavailable10
Not Defined412

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High28
Functional3
Proof-of-Concept522
Unproven184
Not Defined4470

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical61
Local1863
Adjacent2384
Network899

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High57
Low3431
None1719

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required73
None5134

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Last Year

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤3116
≤4585
≤5854
≤61806
≤7925
≤8601
≤9210
≤10110

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤3128
≤4597
≤5951
≤62042
≤7750
≤8504
≤9185
≤1050

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤21
≤3152
≤4842
≤5669
≤62006
≤7603
≤8609
≤9183
≤10142

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤39
≤428
≤5148
≤6507
≤7192
≤8545
≤934
≤1057

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤35
≤413
≤532
≤662
≤751
≤879
≤92
≤102

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤61
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k33
<2k75
<5k988
<10k2949
<25k987
<50k167
<100k7
≥100k1

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k3331
<2k935
<5k675
<10k211
<25k55
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Last Year

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Versions (2676): 0.3, 0.3.1, 0.3.2, 0.9.7, 0.99.7, 0.698, 1.2, 1.3, 1.6, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.6.5, 1.6.6, 1.6.7, 1.6.8, 2.0, 2.0.3, 2.0.18, 2.0.33, 2.0.34, 2.0.35, 2.0.36, 2.0.37, 2.0.38, 2.0.39, 2.1, 2.1.89, 2.1.132, 2.2, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.2.11, 2.2.12, 2.2.13, 2.2.14, 2.2.15, 2.2.15 Pre2, 2.2.16, 2.2.17, 2.2.18, 2.2.19, 2.2.21, 2.2.22, 2.2.23, 2.2.27, 2.3, 2.3.18, 2.3.99, 2.4, 2.4.1, 2.4.2, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.21, 2.4.22, 2.4.23, 2.4.23 Ow2, 2.4.24, 2.4.24 Ow1, 2.4.25, 2.4.26, 2.4.27, 2.4.28, 2.4.29, 2.4.29-rc1, 2.4.31, 2.4.32, 2.4.32-pre1, 2.4.33, 2.4.33.1, 2.4.33.2, 2.4.33.3, 2.4.33.4, 2.4.33.5, 2.4.33.6, 2.4.34, 2.4.34-pre4 ATM, 2.4.34.2, 2.4.35, 2.4.35.2, 2.4.36, 2.4.36.1, 2.4.36.2, 2.4.36.3, 2.4.36.4, 2.4.36.5, 2.4.36.6, 2.5, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.5.5, 2.5.6, 2.5.7, 2.5.8, 2.5.9, 2.5.11, 2.5.12, 2.5.13, 2.5.14, 2.5.15, 2.5.16, 2.5.17, 2.5.18, 2.5.19, 2.5.21, 2.5.22, 2.5.23, 2.5.24, 2.5.25, 2.5.26, 2.5.27, 2.5.28, 2.5.29, 2.5.31, 2.6, 2.6 Test9 Cvs, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.7-rc1, 2.6.7-rc2, 2.6.8, 2.6.8.1, 2.6.8.1.5, 2.6.9, 2.6.11, 2.6.11 Rc1 Bk6, 2.6.11-rc1, 2.6.11-rc2, 2.6.11-rc3, 2.6.11.1, 2.6.11.2, 2.6.11.3, 2.6.11.4, 2.6.11.5, 2.6.11.6, 2.6.11.7, 2.6.11.8, 2.6.11.9, 2.6.11.11, 2.6.11.12, 2.6.12, 2.6.12-rc1, 2.6.12.1, 2.6.12.2, 2.6.12.3, 2.6.12.4, 2.6.12.5, 2.6.12.6, 2.6.13, 2.6.13-rc1, 2.6.13-rc2, 2.6.13-rc3, 2.6.13-rc4, 2.6.13-rc5, 2.6.13-rc6, 2.6.13.1, 2.6.13.2, 2.6.13.3, 2.6.13.4, 2.6.13.5, 2.6.14, 2.6.14-git4, 2.6.14.1, 2.6.14.2, 2.6.14.3, 2.6.14.4, 2.6.14.5, 2.6.14.6, 2.6.14.7, 2.6.15, 2.6.15.1, 2.6.15.2, 2.6.15.3, 2.6.15.4, 2.6.15.5, 2.6.15.6, 2.6.16, 2.6.16 Rc7, 2.6.16-rc1, 2.6.16-rc2, 2.6.16.1, 2.6.16.2, 2.6.16.3, 2.6.16.4, 2.6.16.5, 2.6.16.6, 2.6.16.7, 2.6.16.8, 2.6.16.9, 2.6.16.11, 2.6.16.12, 2.6.16.13, 2.6.16.14, 2.6.16.15, 2.6.16.16, 2.6.16.17, 2.6.16.18, 2.6.16.19, 2.6.16.21, 2.6.16.22, 2.6.16.59, 2.6.17, 2.6.17.1, 2.6.17.2, 2.6.17.3, 2.6.17.4, 2.6.17.5, 2.6.17.6, 2.6.17.7, 2.6.17.8, 2.6.17.9, 2.6.17.11, 2.6.18, 2.6.18-348, 2.6.18.1, 2.6.18.2, 2.6.18.3, 2.6.18.4, 2.6.18.5, 2.6.18.6, 2.6.18.7, 2.6.19, 2.6.19-rc1 s39, 2.6.19.1, 2.6.19.2, 2.6.19.3, 2.6.19.4, 2.6.19.5, 2.6.19.6, 2.6.19.7, 2.6.20.1, 2.6.20.2, 2.6.20.3, 2.6.20.4, 2.6.20.5, 2.6.20.6, 2.6.20.7, 2.6.20.8, 2.6.20.9, 2.6.20.11, 2.6.20.12, 2.6.20.13, 2.6.20.14, 2.6.20.15, 2.6.20.16, 2.6.20.17, 2.6.20.18, 2.6.20.19, 2.6.20.21, 2.6.21, 2.6.21 Rc4, 2.6.21-rc1, 2.6.21-rc2, 2.6.21-rc3, 2.6.21.1, 2.6.21.2, 2.6.21.3, 2.6.21.5, 2.6.21.6, 2.6.21.7, 2.6.22, 2.6.22.1, 2.6.22.2, 2.6.22.3, 2.6.22.4, 2.6.22.5, 2.6.22.6, 2.6.22.7, 2.6.22.8, 2.6.22.9, 2.6.22.11, 2.6.22.12, 2.6.22.13, 2.6.22.14, 2.6.22.15, 2.6.22.16, 2.6.22.17, 2.6.22.18, 2.6.22.19, 2.6.22.21, 2.6.23, 2.6.23.1, 2.6.23.2, 2.6.23.3, 2.6.23.4, 2.6.23.5, 2.6.23.6, 2.6.23.7, 2.6.23.8, 2.6.23.9, 2.6.23.11, 2.6.23.12, 2.6.23.14, 2.6.24, 2.6.25, 2.6.25.1, 2.6.25.2, 2.6.25.3, 2.6.25.4, 2.6.25.5, 2.6.25.6, 2.6.25.7, 2.6.25.8, 2.6.25.9, 2.6.25.11, 2.6.25.12, 2.6.26, 2.6.26.2, 2.6.26.3, 2.6.26.5, 2.6.27, 2.6.27.1, 2.6.27.2, 2.6.27.3, 2.6.27.4, 2.6.27.5, 2.6.27.6, 2.6.27.7, 2.6.27.8, 2.6.27.9, 2.6.27.11, 2.6.27.12, 2.6.27.13, 2.6.27.14, 2.6.27.15, 2.6.27.16, 2.6.27.17, 2.6.27.18, 2.6.27.19, 2.6.27.21, 2.6.27.22, 2.6.27.23, 2.6.27.51, 2.6.28, 2.6.28-rc1, 2.6.28.1, 2.6.28.2, 2.6.28.3, 2.6.28.4, 2.6.28.5, 2.6.28.6, 2.6.28.7, 2.6.28.8, 2.6.28.9, 2.6.29, 2.6.29.1, 2.6.29.2, 2.6.29.3, 2.6.29.4, 2.6.29.5, 2.6.29.6, 2.6.29.rc1, 2.6.29.rc2, 2.6.29.rc2-git1, 2.6.30.1, 2.6.30.2, 2.6.30.3, 2.6.30.4, 2.6.30.5, 2.6.30.6, 2.6.30.7, 2.6.30.8, 2.6.30.9, 2.6.30.y, 2.6.31, 2.6.31-rc1, 2.6.31-rc2, 2.6.31-rc3, 2.6.31-rc4, 2.6.31-rc5, 2.6.31-rc6, 2.6.31-rc7, 2.6.31-rc8, 2.6.31-rc9, 2.6.32, 2.6.32-358, 2.6.32-504.12.2, 2.6.32.1, 2.6.32.2, 2.6.32.3, 2.6.32.4, 2.6.32.5, 2.6.32.6, 2.6.32.7, 2.6.32.8, 2.6.32.9, 2.6.32.11, 2.6.32.12, 2.6.32.13, 2.6.32.14, 2.6.32.15, 2.6.32.16, 2.6.32.17, 2.6.32.18, 2.6.32.51, 2.6.32.61, 2.6.32.63, 2.6.33, 2.6.33.1, 2.6.33.2, 2.6.33.3, 2.6.33.4, 2.6.33.5, 2.6.33.6, 2.6.33.7, 2.6.33.8, 2.6.33.9, 2.6.33.11, 2.6.33.12, 2.6.33.13, 2.6.33.14, 2.6.33.15, 2.6.33.16, 2.6.33.17, 2.6.33.18, 2.6.33.19, 2.6.34, 2.6.34.1, 2.6.34.2, 2.6.34.3, 2.6.34.14, 2.6.35, 2.6.35.1, 2.6.35.2, 2.6.35.3, 2.6.35.4, 2.6.35.5, 2.6.35.6, 2.6.35.7, 2.6.35.8, 2.6.35.9, 2.6.35.11, 2.6.35.12, 2.6.35.13, 2.6.36, 2.6.36.1, 2.6.36.2, 2.6.36.3, 2.6.36.4, 2.6.37, 2.6.37.1, 2.6.37.2, 2.6.37.3, 2.6.37.4, 2.6.37.5, 2.6.37.6, 2.6.38, 2.6.38.1, 2.6.38.2, 2.6.38.3, 2.6.38.4, 2.6.38.5, 2.6.38.6, 2.6.38.7, 2.6.38.8, 2.6.39, 2.6.39.1, 2.6.39.2, 2.6.39.3, 2.6_test9_cvs, 2.7, 2.8, 2.9, 2.10, 2.11, 2.12, 2.12a, 2.13, 2.13.1, 2.13.1.1, 2.14, 2.15, 2.16, 3, 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 3.0.19, 3.0.21, 3.0.22, 3.0.23, 3.0.24, 3.0.25, 3.0.26, 3.0.27, 3.0.28, 3.0.29, 3.0.31, 3.0.32, 3.0.33, 3.0.34, 3.0.36, 3.0.37, 3.0.62, 3.0.63, 3.0.94, 3.1, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.2, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, 3.2.6, 3.2.7, 3.2.8, 3.2.9, 3.2.11, 3.2.12, 3.2.13, 3.2.14, 3.2.15, 3.2.16, 3.2.17, 3.2.18, 3.2.19, 3.2.21, 3.2.22, 3.2.23, 3.2.24, 3.2.25, 3.2.26, 3.2.27, 3.2.28, 3.2.29, 3.2.31, 3.2.32, 3.2.33, 3.2.34, 3.2.35, 3.2.36, 3.2.37, 3.2.38, 3.2.39, 3.2.41, 3.2.42, 3.2.43, 3.2.44, 3.2.45, 3.2.46, 3.2.47, 3.2.48, 3.2.49, 3.2.53, 3.2.55, 3.2.57, 3.2.59, 3.2.101, 3.3, 3.3-rc1, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7-1, 3.3.7.1, 3.3.8, 3.4, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.4.6, 3.4.7, 3.4.8, 3.4.9, 3.4.11, 3.4.12, 3.4.13, 3.4.14, 3.4.15, 3.4.16, 3.4.17, 3.4.18, 3.4.19, 3.4.21, 3.4.22, 3.4.23, 3.4.24, 3.4.25, 3.4.26, 3.4.27, 3.4.28, 3.4.29, 3.4.31, 3.4.32, 3.4.72, 3.4.74, 3.4.83, 3.4.88, 3.4.91, 3.4.96, 3.5, 3.5.1, 3.5.2, 3.5.3, 3.5.4, 3.5.5, 3.5.6, 3.6, 3.6 RC5, 3.6.1, 3.6.2, 3.6.3, 3.6.4, 3.6.5, 3.6.6, 3.6.7, 3.6.8, 3.7, 3.7-rc1, 3.7.1, 3.7.2, 3.7.3, 3.7.4, 3.7.5, 3.8, 3.8-rc1, 3.8-rc2, 3.8-rc3, 3.8-rc4, 3.8-rc5, 3.8-rc6, 3.8-rc7, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.8.7, 3.8.8, 3.8.9, 3.8.13, 3.9, 3.9-rc1, 3.9-rc2, 3.9-rc3, 3.9.1, 3.9.2, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 3.9.8, 3.9.9, 3.9.11, 3.10, 3.10-rc5, 3.10.0-229.20.1.el7.x86_64, 3.10.1, 3.10.2, 3.10.3, 3.10.4, 3.10.5, 3.10.6, 3.10.7, 3.10.8, 3.10.9, 3.10.11, 3.10.12, 3.10.13, 3.10.14, 3.10.15, 3.10.16, 3.10.17, 3.10.18, 3.10.19, 3.10.22, 3.10.24, 3.10.26, 3.10.28, 3.10.33, 3.10.34, 3.10.38, 3.10.41, 3.10.44, 3.10.46, 3.10.77, 3.10rc1, 3.11, 3.11-4, 3.11-rc1, 3.11.1, 3.11.2, 3.11.3, 3.11.4, 3.11.5, 3.11.6, 3.11.7, 3.11.9, 3.12, 3.12.1, 3.12.2, 3.12.3, 3.12.4, 3.12.5, 3.12.6, 3.12.7, 3.12.8, 3.12.9, 3.12.11, 3.12.12, 3.12.13, 3.12.14, 3.12.15, 3.12.16, 3.12.18, 3.12.21, 3.13, 3.13.1, 3.13.2, 3.13.3, 3.13.4, 3.13.5, 3.13.6, 3.13.7, 3.13.8, 3.13.9, 3.13.11, 3.14, 3.14-rc, 3.14-rc7, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.5, 3.14.6, 3.14.7, 3.14.8, 3.14.9, 3.14.11, 3.14.12, 3.14.13, 3.14.14, 3.14.15, 3.14.16, 3.14.17, 3.14.18, 3.14.19, 3.14.21, 3.14.22, 3.14.23, 3.14.24, 3.14.25, 3.14.26, 3.14.27, 3.14.28, 3.14.29, 3.14.31, 3.14.32, 3.14.33, 3.14.34, 3.14.35, 3.14.36, 3.14.37, 3.14.38, 3.14.39, 3.14.41, 3.14.42, 3.14.43, 3.14.44, 3.14.45, 3.14.46, 3.14.47, 3.14.48, 3.14.49, 3.14.51, 3.14.52, 3.14.53, 3.14.54, 3.14.55, 3.14.56, 3.14.57, 3.14.58, 3.14.59, 3.14.61, 3.14.62, 3.14.63, 3.14.64, 3.14.65, 3.14.66, 3.14.67, 3.14.68, 3.14.69, 3.14.71, 3.14.72, 3.14.73, 3.14.74, 3.14.75, 3.14.76, 3.14.77, 3.14.78, 3.14.79, 3.15, 3.15-rc1, 3.15-rc2, 3.15-rc3, 3.15.1, 3.15.2, 3.15.3, 3.15.4, 3.15.5, 3.15.6, 3.15.7, 3.15.8, 3.16, 3.16.1, 3.16.2, 3.16.3, 3.16.4, 3.16.5, 3.16.6, 3.16.7, 3.16.8, 3.16.9, 3.16.11, 3.16.12, 3.16.13, 3.16.14, 3.16.15, 3.16.16, 3.16.17, 3.16.18, 3.16.19, 3.16.21, 3.16.22, 3.16.23, 3.16.24, 3.16.25, 3.16.26, 3.16.27, 3.16.28, 3.16.29, 3.16.31, 3.16.32, 3.16.33, 3.16.34, 3.16.35, 3.16.36, 3.16.37, 3.16.38, 3.16.39, 3.16.41, 3.16.42, 3.16.43, 3.16.44, 3.16.45, 3.16.46, 3.16.47, 3.16.48, 3.16.49, 3.16.51, 3.16.52, 3.16.53, 3.16.54, 3.16.55, 3.16.56, 3.16.57, 3.16.58, 3.16.59, 3.16.61, 3.16.62, 3.16.63, 3.16.64, 3.16.65, 3.17, 3.17.1, 3.17.2, 3.17.3, 3.18, 3.18 rc1, 3.18.1, 3.18.7, 3.18.9, 3.18.136, 3.19, 3.19.1, 3.19.2, 3.19.8, 4, 4.0, 4.0-rc1, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.1, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.1.7, 4.1.8, 4.1.9, 4.1.11, 4.1.12, 4.1.13, 4.1.14, 4.1.15, 4.1.16, 4.1.17, 4.1.18, 4.1.19, 4.1.21, 4.1.22, 4.1.23, 4.1.24, 4.1.25, 4.1.26, 4.1.27, 4.1.28, 4.1.29, 4.1.31, 4.1.32, 4.1.33, 4.1.34, 4.1.35, 4.1.36, 4.1.37, 4.1.38, 4.1.39, 4.1.41, 4.1.42, 4.1.43, 4.1.44, 4.1.45, 4.1.46, 4.1.47, 4.1.48, 4.1.49, 4.2, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.3, 4.3-rc1, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.4, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 4.4.11, 4.4.12, 4.4.13, 4.4.14, 4.4.15, 4.4.16, 4.4.17, 4.4.18, 4.4.19, 4.4.21, 4.4.22, 4.4.27, 4.4.29, 4.4.132, 4.4.176, 4.4.181, 4.4.189, 4.4.194, 4.4.267, 4.4.268, 4.4.271, 4.4.272, 4.4.273, 4.4.275, 4.4.276, 4.4.285, 4.4.288, 4.4.289, 4.4.291, 4.4.292, 4.4.293, 4.4.294, 4.4.295, 4.4.296, 4.4.297, 4.5, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.6, 4.6.1, 4.6.2, 4.6.3, 4.6.4, 4.7, 4.7-rc6, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 4.8, 4.8-rc1, 4.8-rc2, 4.8-rc3, 4.8-rc4, 4.8-rc5, 4.8-rc6, 4.8.1, 4.8.2, 4.8.3, 4.8.4, 4.8.5, 4.8.6, 4.8.7, 4.8.8, 4.8.9, 4.8.11, 4.8.12, 4.8.13, 4.8.14, 4.9, 4.9-rc1, 4.9.1, 4.9.2, 4.9.3, 4.9.4, 4.9.5, 4.9.6, 4.9.7, 4.9.8, 4.9.9, 4.9.11, 4.9.12, 4.9.13, 4.9.14, 4.9.15, 4.9.16, 4.9.17, 4.9.18, 4.9.19, 4.9.21, 4.9.22, 4.9.23, 4.9.24, 4.9.25, 4.9.26, 4.9.27, 4.9.28, 4.9.29, 4.9.31, 4.9.32, 4.9.33, 4.9.34, 4.9.35, 4.9.36, 4.9.37, 4.9.38, 4.9.39, 4.9.41, 4.9.42, 4.9.43, 4.9.44, 4.9.45, 4.9.46, 4.9.47, 4.9.48, 4.9.49, 4.9.51, 4.9.52, 4.9.53, 4.9.54, 4.9.55, 4.9.56, 4.9.57, 4.9.58, 4.9.59, 4.9.61, 4.9.62, 4.9.63, 4.9.64, 4.9.65, 4.9.66, 4.9.67, 4.9.68, 4.9.69, 4.9.71, 4.9.72, 4.9.73, 4.9.74, 4.9.75, 4.9.76, 4.9.77, 4.9.78, 4.9.79, 4.9.81, 4.9.82, 4.9.83, 4.9.84, 4.9.85, 4.9.86, 4.9.101, 4.9.134, 4.9.162, 4.9.181, 4.9.189, 4.9.232, 4.9.267, 4.9.268, 4.9.269, 4.9.271, 4.9.272, 4.9.273, 4.9.275, 4.9.276, 4.9.284, 4.9.286, 4.9.287, 4.9.288, 4.9.289, 4.9.291, 4.9.292, 4.9.293, 4.9.294, 4.9.295, 4.9.312, 4.9.317, 4.9.327, 4.9.329, 4.10, 4.10.1, 4.10.2, 4.10.3, 4.10.4, 4.10.5, 4.10.6, 4.10.7, 4.10.8, 4.10.9, 4.10.11, 4.10.12, 4.10.13, 4.10.14, 4.10.15, 4.11, 4.11-rc1, 4.11-rc2, 4.11-rc3, 4.11-rc4, 4.11-rc5, 4.11-rc6, 4.11-rc7, 4.11-rc8, 4.11.1, 4.11.2, 4.11.3, 4.11.4, 4.11.5, 4.11.6, 4.11.7, 4.11.8, 4.11.9, 4.12, 4.12.1, 4.12.2, 4.12.3, 4.12.4, 4.12.5, 4.12.6, 4.12.7, 4.12.8, 4.12.9, 4.13, 4.13-rc1, 4.13-rc2, 4.13-rc3, 4.13-rc4, 4.13.1, 4.13.2, 4.13.3, 4.13.4, 4.13.5, 4.13.6, 4.13.7, 4.13.8, 4.13.9, 4.13.11, 4.13.12, 4.13.13, 4.14, 4.14.0-rc4, 4.14.1, 4.14.2, 4.14.3, 4.14.4, 4.14.5, 4.14.6, 4.14.7, 4.14.8, 4.14.9, 4.14.11, 4.14.12, 4.14.13, 4.14.14, 4.14.15, 4.14.16, 4.14.17, 4.14.18, 4.14.19, 4.14.21, 4.14.22, 4.14.23, 4.14.24, 4.14.25, 4.14.26, 4.14.27, 4.14.28, 4.14.29, 4.14.31, 4.14.32, 4.14.33, 4.14.34, 4.14.35, 4.14.36, 4.14.37, 4.14.38, 4.14.39, 4.14.41, 4.14.42, 4.14.43, 4.14.44, 4.14.45, 4.14.46, 4.14.47, 4.14.48, 4.14.49, 4.14.51, 4.14.52, 4.14.53, 4.14.54, 4.14.55, 4.14.56, 4.14.57, 4.14.58, 4.14.59, 4.14.61, 4.14.62, 4.14.63, 4.14.64, 4.14.65, 4.14.66, 4.14.67, 4.14.68, 4.14.69, 4.14.71, 4.14.72, 4.14.73, 4.14.74, 4.14.75, 4.14.76, 4.14.77, 4.14.78, 4.14.79, 4.14.81, 4.14.82, 4.14.83, 4.14.84, 4.14.85, 4.14.86, 4.14.87, 4.14.88, 4.14.89, 4.14.105, 4.14.126, 4.14.165, 4.14.177, 4.14.193, 4.14.221, 4.14.231, 4.14.232, 4.14.233, 4.14.234, 4.14.235, 4.14.236, 4.14.237, 4.14.239, 4.14.248, 4.14.249, 4.14.251, 4.14.252, 4.14.253, 4.14.254, 4.14.255, 4.14.256, 4.14.257, 4.14.258, 4.14.259, 4.14.265, 4.14.277, 4.14.282, 4.14.292, 4.14.294, 4.14.295, 4.14.305, 4.14.326, 4.14.327, 4.14.329, 4.14.331, 4.15, 4.15-rc1, 4.15-rc2, 4.15-rc3, 4.15-rc4, 4.15-rc5, 4.15-rc6, 4.15-rc7, 4.15.0-118-generic, 4.15.1, 4.15.2, 4.15.3, 4.15.4, 4.15.5, 4.15.6, 4.15.7, 4.15.8, 4.15.9, 4.15.11, 4.15.12, 4.15.13, 4.15.14, 4.15.15, 4.16, 4.16-rc1, 4.16-rc2, 4.16-rc3, 4.16-rc4, 4.16-rc5, 4.16-rc6, 4.16.1, 4.16.2, 4.16.3, 4.16.4, 4.16.4rc1, 4.16.4rc2, 4.16.4rc3, 4.16.4rc4, 4.16.5, 4.16.6, 4.16.7, 4.16.8, 4.16.9, 4.16.11, 4.16.12, 4.17, 4.17.1, 4.17.2, 4.17.3, 4.17.4, 4.17.5, 4.17.6, 4.17.7, 4.17.8, 4.17.9, 4.17.11, 4.18, 4.18.0-193.el7, 4.18.1, 4.18.2, 4.18.3, 4.18.4, 4.18.5, 4.18.6, 4.18.7, 4.18.8, 4.18.9, 4.18.11, 4.18.12, 4.18.13, 4.18.14, 4.18.15, 4.19, 4.19-rc1, 4.19.1, 4.19.2, 4.19.3, 4.19.4, 4.19.5, 4.19.6, 4.19.7, 4.19.8, 4.19.9, 4.19.11, 4.19.12, 4.19.13, 4.19.14, 4.19.15, 4.19.16, 4.19.17, 4.19.18, 4.19.19, 4.19.21, 4.19.22, 4.19.23, 4.19.24, 4.19.25, 4.19.26, 4.19.27, 4.19.28, 4.19.29, 4.19.31, 4.19.32, 4.19.33, 4.19.34, 4.19.35, 4.19.36, 4.19.37, 4.19.38, 4.19.39, 4.19.41, 4.19.42, 4.19.43, 4.19.44, 4.19.45, 4.19.46, 4.19.47, 4.19.48, 4.19.49, 4.19.51, 4.19.52, 4.19.53, 4.19.54, 4.19.55, 4.19.56, 4.19.57, 4.19.58, 4.19.59, 4.19.61, 4.19.62, 4.19.63, 4.19.64, 4.19.65, 4.19.66, 4.19.67, 4.19.68, 4.19.69, 4.19.71, 4.19.72, 4.19.73, 4.19.74, 4.19.75, 4.19.76, 4.19.77, 4.19.78, 4.19.79, 4.19.81, 4.19.82, 4.19.83, 4.19.84, 4.19.85, 4.19.86, 4.19.87, 4.19.88, 4.19.89, 4.19.91, 4.19.92, 4.19.93, 4.19.94, 4.19.95, 4.19.96, 4.19.118, 4.19.136, 4.19.139, 4.19.176, 4.19.186, 4.19.188, 4.19.189, 4.19.191, 4.19.192, 4.19.193, 4.19.194, 4.19.195, 4.19.197, 4.19.198, 4.19.208, 4.19.209, 4.19.212, 4.19.213, 4.19.214, 4.19.215, 4.19.216, 4.19.217, 4.19.218, 4.19.219, 4.19.221, 4.19.222, 4.19.223, 4.19.228, 4.19.235, 4.19.241, 4.19.244, 4.19.246, 4.19.255, 4.19.257, 4.19.259, 4.19.261, 4.19.272, 4.19.279, 4.19.295, 4.19.296, 4.19.298, 4.19.299, 4.19.305, 4.19.306, 4.19.307, 4.19.308, 4.19.309, 4.19.311, 4.19.312, 4.19.313, 4.20, 4.20.1, 4.20.2, 4.20.3, 4.20.4, 4.20.5, 4.20.6, 4.20.7, 4.20.8, 4.20.9, 4.20.11, 4.20.12, 4.20.13, 4.20.14, 5, 5.0, 5.0.0-rc7, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0.15, 5.0.16, 5.0.17, 5.0.18, 5.0.21, 5.1, 5.1-rc1, 5.1-rc2, 5.1-rc3, 5.1-rc4, 5.1-rc5, 5.1-rc6, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.1.11, 5.1.12, 5.1.13, 5.1.14, 5.1.15, 5.1.16, 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 5.2.8, 5.2.9, 5.2.11, 5.2.12, 5.2.13, 5.2.14, 5.2.15, 5.2.16, 5.2.17, 5.3, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.3.5, 5.3.6, 5.3.7, 5.3.8, 5.3.9, 5.3.11, 5.3.12, 5.3.13, 5.4, 5.4.0-rc2, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.4.6, 5.4.7, 5.4.8, 5.4.9, 5.4.11, 5.4.12, 5.4.13, 5.4.14, 5.4.15, 5.4.16, 5.4.17, 5.4.18, 5.4.19, 5.4.21, 5.4.22, 5.4.23, 5.4.24, 5.4.25, 5.4.26, 5.4.27, 5.4.28, 5.4.29, 5.4.31, 5.4.32, 5.4.33, 5.4.34, 5.4.35, 5.4.36, 5.4.37, 5.4.38, 5.4.39, 5.4.41, 5.4.42, 5.4.43, 5.4.44, 5.4.45, 5.4.46, 5.4.47, 5.4.48, 5.4.49, 5.4.51, 5.4.52, 5.4.53, 5.4.54, 5.4.55, 5.4.56, 5.4.57, 5.4.58, 5.4.59, 5.4.61, 5.4.62, 5.4.63, 5.4.64, 5.4.65, 5.4.66, 5.4.67, 5.4.68, 5.4.69, 5.4.71, 5.4.72, 5.4.73, 5.4.74, 5.4.75, 5.4.76, 5.4.77, 5.4.78, 5.4.79, 5.4.81, 5.4.82, 5.4.83, 5.4.84, 5.4.85, 5.4.86, 5.4.87, 5.4.88, 5.4.89, 5.4.91, 5.4.92, 5.4.93, 5.4.94, 5.4.95, 5.4.96, 5.4.97, 5.4.98, 5.4.111, 5.4.113, 5.4.114, 5.4.116, 5.4.117, 5.4.118, 5.4.119, 5.4.121, 5.4.122, 5.4.123, 5.4.124, 5.4.125, 5.4.126, 5.4.127, 5.4.132, 5.4.133, 5.4.134, 5.4.135, 5.4.138, 5.4.149, 5.4.151, 5.4.152, 5.4.153, 5.4.154, 5.4.155, 5.4.156, 5.4.157, 5.4.158, 5.4.161, 5.4.162, 5.4.163, 5.4.164, 5.4.167, 5.4.168, 5.4.169, 5.4.178, 5.4.186, 5.4.188, 5.4.192, 5.4.195, 5.4.197, 5.4.209, 5.4.212, 5.4.214, 5.4.219, 5.4.231, 5.4.236, 5.4.239, 5.4.257, 5.4.258, 5.4.261, 5.4.262, 5.4.263, 5.4.264, 5.4.267, 5.4.268, 5.4.269, 5.4.271, 5.4.272, 5.4.273, 5.4.274, 5.4.275, 5.5, 5.5-rc1, 5.5-rc2, 5.5-rc3, 5.5-rc4, 5.5-rc5, 5.5-rc6, 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.5, 5.5.6, 5.5.7, 5.5.8, 5.5.9, 5.5.11, 5.5.12, 5.5.13, 5.6, 5.6-rc1, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.11, 5.6.12, 5.6.13, 5.7, 5.7-rc6, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 5.7.5, 5.7.6, 5.7.7, 5.7.8, 5.7.9, 5.7.11, 5.8, 5.8-rc1, 5.8-rc2, 5.8-rc3, 5.8-rc4, 5.8-rc5, 5.8.1, 5.8.2, 5.8.3, 5.8.4, 5.8.5, 5.8.6, 5.8.7, 5.8.8, 5.8.9, 5.8.11, 5.8.12, 5.8.13, 5.8.14, 5.9, 5.9-rc1, 5.9-rc2, 5.9-rc3, 5.9-rc4, 5.9-rc5, 5.9-rc6, 5.9.1, 5.9.2, 5.9.3, 5.9.4, 5.9.5, 5.9.6, 5.9.7, 5.9.8, 5.9.9, 5.9.11, 5.9.12, 5.9.13, 5.9.rc1, 5.9.rc2, 5.9.rc3, 5.9.rc4, 5.10, 5.10-rc1, 5.10-rc2, 5.10-rc3, 5.10-rc4, 5.10-rc5, 5.10.1, 5.10.2, 5.10.3, 5.10.4, 5.10.5, 5.10.6, 5.10.7, 5.10.8, 5.10.9, 5.10.11, 5.10.12, 5.10.13, 5.10.14, 5.10.15, 5.10.16, 5.10.17, 5.10.18, 5.10.19, 5.10.21, 5.10.22, 5.10.23, 5.10.24, 5.10.25, 5.10.26, 5.10.27, 5.10.28, 5.10.29, 5.10.31, 5.10.32, 5.10.33, 5.10.34, 5.10.35, 5.10.36, 5.10.37, 5.10.38, 5.10.39, 5.10.41, 5.10.42, 5.10.43, 5.10.44, 5.10.45, 5.10.46, 5.10.47, 5.10.48, 5.10.49, 5.10.51, 5.10.52, 5.10.53, 5.10.54, 5.10.55, 5.10.56, 5.10.57, 5.10.58, 5.10.59, 5.10.61, 5.10.62, 5.10.63, 5.10.64, 5.10.65, 5.10.66, 5.10.67, 5.10.68, 5.10.69, 5.10.71, 5.10.72, 5.10.73, 5.10.74, 5.10.75, 5.10.76, 5.10.77, 5.10.78, 5.10.79, 5.10.81, 5.10.82, 5.10.83, 5.10.84, 5.10.85, 5.10.86, 5.10.87, 5.10.88, 5.10.89, 5.10.91, 5.10.92, 5.10.93, 5.10.94, 5.10.95, 5.10.96, 5.10.97, 5.10.98, 5.10.99, 5.10.101, 5.10.107, 5.10.112, 5.10.117, 5.10.121, 5.10.131, 5.10.135, 5.10.136, 5.10.142, 5.10.144, 5.10.145, 5.10.146, 5.10.149, 5.10.154, 5.10.161, 5.10.167, 5.10.168, 5.10.174, 5.10.179, 5.10.187, 5.10.197, 5.10.198, 5.10.201, 5.10.202, 5.10.203, 5.10.204, 5.10.208, 5.10.209, 5.10.211, 5.10.212, 5.10.213, 5.10.214, 5.10.215, 5.10.216, 5.11, 5.11-rc1, 5.11-rc2, 5.11-rc3, 5.11-rc4, 5.11.1, 5.11.2, 5.11.3, 5.11.4, 5.11.5, 5.11.6, 5.11.7, 5.11.8, 5.11.9, 5.11.11, 5.11.12, 5.11.13, 5.11.14, 5.11.15, 5.11.16, 5.11.17, 5.11.18, 5.11.19, 5.11.21, 5.12, 5.12-rc1, 5.12-rc2, 5.12-rc3, 5.12-rc4, 5.12-rc5, 5.12-rc6, 5.12-rc7, 5.12.0-rc1, 5.12.0-rc2, 5.12.0-rc3, 5.12.1, 5.12.2, 5.12.3, 5.12.4, 5.12.5, 5.12.6, 5.12.7, 5.12.8, 5.12.9, 5.12.11, 5.12.12, 5.12.13, 5.12.14, 5.12.15, 5.12.16, 5.12.17, 5.12.18, 5.13, 5.13-rc1, 5.13-rc2, 5.13-rc3, 5.13-rc4, 5.13.1, 5.13.2, 5.13.3, 5.13.4, 5.13.5, 5.13.6, 5.13.7, 5.13.8, 5.13.9, 5.13.11, 5.13.12, 5.13.13, 5.14, 5.14-rc1, 5.14-rc2, 5.14-rc3, 5.14-rc4, 5.14-rc5, 5.14-rc6, 5.14.1, 5.14.2, 5.14.3, 5.14.4, 5.14.5, 5.14.6, 5.14.7, 5.14.8, 5.14.9, 5.14.11, 5.14.12, 5.14.13, 5.14.14, 5.14.15, 5.14.16, 5.14.17, 5.14.18, 5.14.19, 5.15, 5.15-rc1, 5.15-rc2, 5.15-rc3, 5.15-rc4, 5.15-rc5, 5.15.0-58, 5.15.1, 5.15.2, 5.15.3, 5.15.4, 5.15.5, 5.15.6, 5.15.7, 5.15.8, 5.15.9, 5.15.11, 5.15.12, 5.15.13, 5.15.14, 5.15.15, 5.15.16, 5.15.17, 5.15.18, 5.15.19, 5.15.21, 5.15.22, 5.15.23, 5.15.24, 5.15.25, 5.15.26, 5.15.27, 5.15.28, 5.15.29, 5.15.31, 5.15.32, 5.15.33, 5.15.34, 5.15.35, 5.15.36, 5.15.37, 5.15.38, 5.15.39, 5.15.41, 5.15.42, 5.15.43, 5.15.44, 5.15.45, 5.15.46, 5.15.47, 5.15.48, 5.15.49, 5.15.51, 5.15.52, 5.15.53, 5.15.54, 5.15.55, 5.15.56, 5.15.57, 5.15.58, 5.15.59, 5.15.61, 5.15.62, 5.15.63, 5.15.64, 5.15.65, 5.15.66, 5.15.67, 5.15.68, 5.15.69, 5.15.71, 5.15.72, 5.15.73, 5.15.74, 5.15.75, 5.15.76, 5.15.77, 5.15.78, 5.15.79, 5.15.81, 5.15.82, 5.15.83, 5.15.84, 5.15.85, 5.15.86, 5.15.87, 5.15.88, 5.15.89, 5.15.91, 5.15.92, 5.15.93, 5.15.94, 5.15.131, 5.15.133, 5.15.134, 5.15.135, 5.15.136, 5.15.137, 5.15.138, 5.15.139, 5.15.141, 5.15.142, 5.15.143, 5.15.144, 5.15.147, 5.15.148, 5.15.149, 5.15.151, 5.15.152, 5.15.153, 5.15.154, 5.15.155, 5.15.156, 5.15.157, 5.15.158, 5.16, 5.16-rc1, 5.16-rc2, 5.16-rc3, 5.16-rc4, 5.16-rc5, 5.16-rc6, 5.16.1, 5.16.2, 5.16.3, 5.16.4, 5.16.5, 5.16.6, 5.16.7, 5.16.8, 5.16.9, 5.16.11, 5.16.12, 5.16.13, 5.16.14, 5.16.15, 5.16.16, 5.17, 5.17-rc1, 5.17-rc2, 5.17-rc3, 5.17-rc4, 5.17-rc5, 5.17-rc6, 5.17-rc7, 5.17.1, 5.17.2, 5.17.3, 5.17.4, 5.17.5, 5.17.6, 5.17.7, 5.17.8, 5.17.9, 5.17.11, 5.17.12, 5.17.13, 5.17.14, 5.18, 5.18-rc1, 5.18-rc2, 5.18-rc3, 5.18-rc4, 5.18-rc5, 5.18.1, 5.18.2, 5.18.3, 5.18.4, 5.18.5, 5.18.6, 5.18.7, 5.18.8, 5.18.9, 5.18.11, 5.18.12, 5.18.13, 5.18.14, 5.18.15, 5.18.16, 5.18.17, 5.19, 5.19-rc1, 5.19-rc2, 5.19-rc3, 5.19.1, 5.19.2, 5.19.3, 5.19.4, 5.19.5, 5.19.6, 5.19.7, 5.19.8, 5.19.9, 5.19.11, 5.19.12, 5.19.13, 5.19.14, 5.19.15, 5.19.16, 6, 6.0, 6.0-rc1, 6.0-rc2, 6.0-rc3, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.1, 6.1 RC6, 6.1-rc1, 6.1-rc2, 6.1-rc3, 6.1-rc4, 6.1-rc5, 6.1-rc6, 6.1-rc7, 6.1-rc8, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.1.9, 6.1.11, 6.1.12, 6.1.13, 6.1.14, 6.1.15, 6.1.16, 6.1.17, 6.1.18, 6.1.19, 6.1.21, 6.1.22, 6.1.23, 6.1.24, 6.1.25, 6.1.26, 6.1.27, 6.1.28, 6.1.29, 6.1.31, 6.1.32, 6.1.33, 6.1.34, 6.1.35, 6.1.36, 6.1.37, 6.1.38, 6.1.39, 6.1.41, 6.1.42, 6.1.43, 6.1.44, 6.1.45, 6.1.46, 6.1.47, 6.1.48, 6.1.49, 6.1.51, 6.1.52, 6.1.53, 6.1.54, 6.1.55, 6.1.56, 6.1.57, 6.1.58, 6.1.59, 6.1.61, 6.1.62, 6.1.63, 6.1.64, 6.1.65, 6.1.66, 6.1.67, 6.1.68, 6.1.69, 6.1.71, 6.1.72, 6.1.73, 6.1.74, 6.1.75, 6.1.76, 6.1.77, 6.1.78, 6.1.79, 6.1.81, 6.1.82, 6.1.83, 6.1.84, 6.1.85, 6.1.86, 6.1.87, 6.1.88, 6.1.89, 6.2, 6.2-rc1, 6.2-rc2, 6.2-rc3, 6.2-rc4, 6.2-rc5, 6.2-rc6, 6.2.0-rc1, 6.2.0-rc2, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.2.9, 6.2.11, 6.2.12, 6.2.13, 6.2.14, 6.2.16, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 6.3-rc4, 6.3-rc5, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.3.8, 6.3.9, 6.4, 6.4-rc1, 6.4-rc6, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 6.4.9, 6.4.11, 6.4.12, 6.4.13, 6.4.14, 6.4.15, 6.5, 6.5-rc1, 6.5-rc2, 6.5-rc3, 6.5-rc4, 6.5-rc5, 6.5-rc6, 6.5.1, 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.5.8, 6.5.9, 6.5.11, 6.5.12, 6.5.rc7, 6.6, 6.6-rc1, 6.6-rc2, 6.6-rc3, 6.6-rc4, 6.6-rc5, 6.6-rc6, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 6.6.9, 6.6.11, 6.6.12, 6.6.13, 6.6.14, 6.6.15, 6.6.16, 6.6.17, 6.6.18, 6.6.19, 6.6.21, 6.6.22, 6.6.23, 6.6.24, 6.6.25, 6.6.26, 6.6.27, 6.6.28, 6.6.29, 6.7, 6.7-rc1, 6.7-rc2, 6.7-rc3, 6.7-rc4, 6.7-rc5, 6.7-rc6, 6.7.1, 6.7.2, 6.7.3, 6.7.4, 6.7.5, 6.7.6, 6.7.7, 6.7.8, 6.7.9, 6.7.11, 6.8, 6.8-rc0, 6.8-rc1, 6.8-rc2, 6.8-rc3, 6.8-rc4, 6.8-rc5, 6.8-rc6, 6.8.1, 6.8.2, 6.8.3, 6.8.4, 6.8.5, 6.8.6, 6.8.7, 6.8.8, 6.8.9, 6.9-rc1, 6.9-rc2, 6.9-rc3, 6.9-rc4, 6.9-rc5, 6.9-rc6, 18.04 LTS, 46.1, 46.1.1, 46.1.2, 46.1.3, 46.1.4, 46.1.5, 46.1.6, 46.1.7, 46.1.8, 46.1.9, 46.1.11, 46.1.12, 46.1.13, 46.1.14, 46.1.15, 46.1.16, 46.1.17, 46.1.18, 46.1.19, 46.1.21, 46.1.22, 46.1.23, 46.1.24, 46.1.25, 46.1.26, 46.1.27, 46.1.28, 46.1.29, 46.1.31, 46.1.32, 46.1.33, 46.1.34, 46.1.35, 46.1.36, 46.1.37, 46.1.38, 46.1.39, 46.1.41, 46.1.42, 46.1.43, 46.1.44, 46.1.45, 46.1.46, 46.1.47, 46.1.48, 46.1.49, 46.1.51, 46.1.52, 46.1.53, 46.1.54, 46.1.55, 46.1.56, 46.1.57, 46.1.58, 46.1.59, 46.1.61, 46.1.62, 46.1.63, 46.1.64, 46.1.65, 46.1.66, 46.1.67, 46.1.68, 46.1.69, 46.1.71, 46.1.72, 46.1.73, 46.1.74, 46.1.75, 46.1.76, 46.1.77, 46.1.78, 46.1.79, 46.1.81, 46.1.82, 46.1.83, 46.1.84, 0221.a, 0221.b, 0221.c, 592.a, 592.b, 592.c, 802.15.4, <4.9.33

Link to Product Website: https://www.kernel.org/

Software Type: Operating System

PublishedBaseTempVulnerability0dayTodayExpRemCTICVE
05/24/20245.75.5Linux Kernel r8188eu rtw_wx_read32 memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47570
05/24/20245.75.5Linux Kernel ksmbd get_file_stream_info memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47568
05/24/20245.75.5Linux Kernel devfreq reference count$5k-$25k$0-$5kNot DefinedOfficial Fix0.07+CVE-2021-47532
05/24/20245.75.5Linux Kernel netif_carrier_off null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.07+CVE-2021-47560
05/24/20245.75.5Linux Kernel rxrpc_lookup_peer memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.07+CVE-2021-47538
05/24/20248.07.6Linux Kernel emergency_ctx stack-based overflow$5k-$25k$5k-$25kNot DefinedOfficial Fix0.07+CVE-2021-47567
05/24/20244.64.4Linux Kernel drm_gem_mmap_obj state issue$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47531
05/24/20242.62.5Linux Kernel io_uring io_uring.c denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47569
05/24/20245.75.5Linux Kernel mpt3sas sas_target denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47565
05/24/20247.16.8Linux Kernel marvell prestera_bridge_port_join double free$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00+CVE-2021-47564
05/24/20244.84.6Linux Kernel num_possible_cpus null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47562
05/24/20245.75.5Linux Kernel smc_vlan_by_tcpsk null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47559
05/24/20245.75.5Linux Kernel register_vlan_dev reference count$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47555
05/24/20245.75.5Linux Kernel ethtool_set_coalesce null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47556
05/24/20244.84.6Linux Kernel blk-mq disk_release null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47552
05/24/20245.75.5Linux Kernel start_cpsch initialization$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47551
05/24/20245.75.5Linux Kernel amdgpu_get_xgmi_hive memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47550
05/24/20243.53.4Linux Kernel tulip out-of-bounds$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47547
05/24/20245.75.5Linux Kernel perf report perf_tip memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47543
05/24/20244.84.6Linux Kernel Virtual Address mt7915_get_phy_mode null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47540
05/24/20245.75.5Linux Kernel rxrpc_look_up_bundle memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47539
05/24/20245.75.5Linux Kernel iwlwifi reduce_power_data memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47529
05/24/20248.07.6Linux Kernel smc_lgr_cleanup_early memory corruption$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00+CVE-2021-47536
05/24/20245.75.5Linux Kernel remove null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47526
05/24/20248.07.6Linux Kernel liteuart use after free$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00+CVE-2021-47525
05/24/20245.75.5Linux Kernel liteuart allocation of resources$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47524
05/24/20245.75.5Linux Kernel hfi1_init allocation of resources$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47523
05/24/20245.75.5Linux Kernel bigbenff report_field null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47522
05/24/20248.07.6Linux Kernel sja1000 ems_pcmcia_add_card use after free$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47521
05/24/20248.07.6Linux Kernel pch_can use after free$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47520
05/24/20245.75.5Linux Kernel m_can_read_fifo memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47519
05/24/20245.75.5Linux Kernel nfc null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47518
05/24/20245.75.5Linux Kernel nfp_cpp_area_cache_add memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47516
05/24/20245.75.5Linux Kernel devlink_nl_cmd_reload reference count$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47514
05/24/20248.07.6Linux Kernel ALSA size_t buffer overflow$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47511
05/24/20248.07.6Linux Kernel sched dump_stack.c fq_pie_destroy stack-based overflow$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00+CVE-2021-47512
05/24/20245.55.3Linux Kernel n_gsm Privilege Escalation$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2023-52880
05/24/20248.07.6Linux Kernel staging _rtl92e_pci_disconnect use after free$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00+CVE-2021-47571
05/24/20248.07.6Linux Kernel vmcore clear_user memory corruption$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00+CVE-2021-47566
05/24/20244.84.6Linux Kernel stmmac netif_tx_disable denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47558
05/24/20245.55.3Linux Kernel sched bringup_cpu initialization$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47553
05/24/20245.35.1Linux Kernel ipv6 fib6_rule_suppress memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47546
05/24/20245.75.5Linux Kernel octeontx2-af rvu_mbox_init memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.00+CVE-2021-47537
05/24/20245.75.5Linux Kernel drm_crtc_commit_put memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.04+CVE-2021-47534
05/24/20248.07.6Linux Kernel drm_crtc_commit_put use after free$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00+CVE-2021-47533
05/24/20245.75.5Linux Kernel wait_fence memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.15+CVE-2021-47530
05/24/20245.75.5Linux Kernel usb cdnsp_endpoint_init null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.18+CVE-2021-47528
05/24/20247.16.8Linux Kernel ethtool use after free$5k-$25k$5k-$25kNot DefinedOfficial Fix0.11+CVE-2021-47517
05/24/20245.75.5Linux Kernel ip_input.c seg6_do_srh_encap null pointer dereference$5k-$25k$0-$5kNot DefinedOfficial Fix0.15+CVE-2021-47515
05/24/20245.75.5Linux Kernel felix_setup_mmio_filtering memory leak$5k-$25k$0-$5kNot DefinedOfficial Fix0.07+CVE-2021-47513

5157 more entries are not shown

more entries by Linux

Might our Artificial Intelligence support you?

Check our Alexa App!