{"id":"USN-8033-5","summary":"linux-gcp-5.15, linux-kvm, linux-oracle, linux-oracle-5.15 vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Nios II architecture;\n  - Sun Sparc architecture;\n  - User-Mode Linux (UML);\n  - x86 architecture;\n  - Block layer subsystem;\n  - Cryptographic API;\n  - Drivers core;\n  - Bus devices;\n  - Hardware random number generator core;\n  - Data acquisition framework and drivers;\n  - CPU frequency scaling framework;\n  - DMA engine subsystem;\n  - GPU drivers;\n  - HW tracing;\n  - Input Device (Miscellaneous) drivers;\n  - Multiple devices driver;\n  - Media drivers;\n  - MOST (Media Oriented Systems Transport) drivers;\n  - MTD block device drivers;\n  - Network drivers;\n  - NVME drivers;\n  - PCI subsystem;\n  - Performance monitor drivers;\n  - Pin controllers subsystem;\n  - x86 platform drivers;\n  - PPS (Pulse Per Second) driver;\n  - PWM drivers;\n  - SCSI subsystem;\n  - TCM subsystem;\n  - Userspace I/O drivers;\n  - USB Gadget drivers;\n  - USB Host Controller drivers;\n  - Framebuffer layer;\n  - BTRFS file system;\n  - File systems infrastructure;\n  - Ext4 file system;\n  - Network file system (NFS) server daemon;\n  - NTFS3 file system;\n  - SMB network file system;\n  - padata parallel execution mechanism;\n  - IP tunnels definitions;\n  - Network sockets;\n  - XFRM subsystem;\n  - Control group (cgroup);\n  - Padata parallel execution mechanism;\n  - PID allocator;\n  - Tracing infrastructure;\n  - Memory management;\n  - 9P file system network protocol;\n  - Ethernet bridge;\n  - Ceph Core library;\n  - Networking core;\n  - IPv4 networking;\n  - IPv6 networking;\n  - NFC subsystem;\n  - RF switch subsystem;\n  - SCTP protocol;\n  - Unix domain sockets;\n  - VMware vSockets driver;\n  - Intel ASoC drivers;\n  - USB sound devices;\n(CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21861,\nCVE-2025-22058, CVE-2025-23143, CVE-2025-38236, CVE-2025-38248,\nCVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,\nCVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,\nCVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,\nCVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,\nCVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,\nCVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,\nCVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,\nCVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,\nCVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,\nCVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,\nCVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,\nCVE-2025-40035, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044,\nCVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055,\nCVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,\nCVE-2025-40081, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,\nCVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106,\nCVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,\nCVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,\nCVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127,\nCVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154,\nCVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,\nCVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188,\nCVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205,\nCVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,\nCVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,\nCVE-2025-40244, CVE-2025-40245, CVE-2025-40346, CVE-2025-40349,\nCVE-2025-40351, CVE-2025-68249)\n","modified":"2026-05-23T01:34:19.257110473Z","published":"2026-02-17T14:57:00Z","related":["UBUNTU-CVE-2024-53114","UBUNTU-CVE-2024-56538","UBUNTU-CVE-2024-58011","UBUNTU-CVE-2025-21861","UBUNTU-CVE-2025-22058","UBUNTU-CVE-2025-23143","UBUNTU-CVE-2025-38236","UBUNTU-CVE-2025-38248","UBUNTU-CVE-2025-38584","UBUNTU-CVE-2025-39869","UBUNTU-CVE-2025-39873","UBUNTU-CVE-2025-39876","UBUNTU-CVE-2025-39880","UBUNTU-CVE-2025-39883","UBUNTU-CVE-2025-39885","UBUNTU-CVE-2025-39907","UBUNTU-CVE-2025-39911","UBUNTU-CVE-2025-39913","UBUNTU-CVE-2025-39923","UBUNTU-CVE-2025-39934","UBUNTU-CVE-2025-39937","UBUNTU-CVE-2025-39943","UBUNTU-CVE-2025-39945","UBUNTU-CVE-2025-39949","UBUNTU-CVE-2025-39951","UBUNTU-CVE-2025-39953","UBUNTU-CVE-2025-39955","UBUNTU-CVE-2025-39967","UBUNTU-CVE-2025-39968","UBUNTU-CVE-2025-39969","UBUNTU-CVE-2025-39970","UBUNTU-CVE-2025-39971","UBUNTU-CVE-2025-39972","UBUNTU-CVE-2025-39973","UBUNTU-CVE-2025-39980","UBUNTU-CVE-2025-39985","UBUNTU-CVE-2025-39986","UBUNTU-CVE-2025-39987","UBUNTU-CVE-2025-39988","UBUNTU-CVE-2025-39994","UBUNTU-CVE-2025-39995","UBUNTU-CVE-2025-39996","UBUNTU-CVE-2025-39998","UBUNTU-CVE-2025-40001","UBUNTU-CVE-2025-40006","UBUNTU-CVE-2025-40011","UBUNTU-CVE-2025-40020","UBUNTU-CVE-2025-40021","UBUNTU-CVE-2025-40026","UBUNTU-CVE-2025-40027","UBUNTU-CVE-2025-40029","UBUNTU-CVE-2025-40030","UBUNTU-CVE-2025-40035","UBUNTU-CVE-2025-40042","UBUNTU-CVE-2025-40043","UBUNTU-CVE-2025-40044","UBUNTU-CVE-2025-40048","UBUNTU-CVE-2025-40049","UBUNTU-CVE-2025-40053","UBUNTU-CVE-2025-40055","UBUNTU-CVE-2025-40060","UBUNTU-CVE-2025-40068","UBUNTU-CVE-2025-40070","UBUNTU-CVE-2025-40078","UBUNTU-CVE-2025-40081","UBUNTU-CVE-2025-40085","UBUNTU-CVE-2025-40087","UBUNTU-CVE-2025-40088","UBUNTU-CVE-2025-40092","UBUNTU-CVE-2025-40094","UBUNTU-CVE-2025-40105","UBUNTU-CVE-2025-40106","UBUNTU-CVE-2025-40109","UBUNTU-CVE-2025-40111","UBUNTU-CVE-2025-40112","UBUNTU-CVE-2025-40115","UBUNTU-CVE-2025-40116","UBUNTU-CVE-2025-40118","UBUNTU-CVE-2025-40120","UBUNTU-CVE-2025-40121","UBUNTU-CVE-2025-40124","UBUNTU-CVE-2025-40125","UBUNTU-CVE-2025-40126","UBUNTU-CVE-2025-40127","UBUNTU-CVE-2025-40134","UBUNTU-CVE-2025-40140","UBUNTU-CVE-2025-40153","UBUNTU-CVE-2025-40154","UBUNTU-CVE-2025-40167","UBUNTU-CVE-2025-40171","UBUNTU-CVE-2025-40173","UBUNTU-CVE-2025-40178","UBUNTU-CVE-2025-40179","UBUNTU-CVE-2025-40183","UBUNTU-CVE-2025-40187","UBUNTU-CVE-2025-40188","UBUNTU-CVE-2025-40194","UBUNTU-CVE-2025-40200","UBUNTU-CVE-2025-40204","UBUNTU-CVE-2025-40205","UBUNTU-CVE-2025-40215","UBUNTU-CVE-2025-40219","UBUNTU-CVE-2025-40220","UBUNTU-CVE-2025-40223","UBUNTU-CVE-2025-40231","UBUNTU-CVE-2025-40233","UBUNTU-CVE-2025-40240","UBUNTU-CVE-2025-40243","UBUNTU-CVE-2025-40244","UBUNTU-CVE-2025-40245","UBUNTU-CVE-2025-40346","UBUNTU-CVE-2025-40349","UBUNTU-CVE-2025-40351","UBUNTU-CVE-2025-68249"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8033-5"}],"affected":[{"package":{"name":"linux-gcp-5.15","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-5.15?arch=source&distro=esm-infra%2Ffocal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1100.109~20.04.1"}]}],"versions":["5.15.0-1006.9~20.04.1","5.15.0-1012.17~20.04.1","5.15.0-1013.18~20.04.1","5.15.0-1016.21~20.04.1","5.15.0-1017.23~20.04.2","5.15.0-1018.24~20.04.1","5.15.0-1021.28~20.04.1","5.15.0-1022.29~20.04.1","5.15.0-1025.32~20.04.2","5.15.0-1026.33~20.04.1","5.15.0-1027.34~20.04.1","5.15.0-1029.36~20.04.1","5.15.0-1030.37~20.04.1","5.15.0-1031.38~20.04.1","5.15.0-1032.40~20.04.1","5.15.0-1033.41~20.04.1","5.15.0-1034.42~20.04.1","5.15.0-1035.43~20.04.1","5.15.0-1036.44~20.04.1","5.15.0-1037.45~20.04.1","5.15.0-1038.46~20.04.1","5.15.0-1039.47~20.04.1","5.15.0-1040.48~20.04.1","5.15.0-1041.49~20.04.1","5.15.0-1042.50~20.04.1","5.15.0-1044.52~20.04.1","5.15.0-1045.53~20.04.2","5.15.0-1046.54~20.04.1","5.15.0-1047.55~20.04.1","5.15.0-1048.56~20.04.1","5.15.0-1049.57~20.04.1","5.15.0-1051.59~20.04.1","5.15.0-1052.60~20.04.1","5.15.0-1053.61~20.04.1","5.15.0-1054.62~20.04.1","5.15.0-1055.63~20.04.1","5.15.0-1058.66~20.04.1","5.15.0-1059.67~20.04.1","5.15.0-1060.68~20.04.1","5.15.0-1062.70~20.04.1","5.15.0-1065.73~20.04.1","5.15.0-1066.74~20.04.1","5.15.0-1067.75~20.04.1","5.15.0-1068.76~20.04.1","5.15.0-1069.77~20.04.1","5.15.0-1070.78~20.04.1","5.15.0-1071.79~20.04.1","5.15.0-1072.80~20.04.1","5.15.0-1073.81~20.04.1","5.15.0-1074.83~20.04.1","5.15.0-1075.84~20.04.1","5.15.0-1077.86~20.04.1","5.15.0-1078.87~20.04.1","5.15.0-1081.90~20.04.1","5.15.0-1083.92~20.04.1","5.15.0-1085.94~20.04.1","5.15.0-1086.95~20.04.1","5.15.0-1087.96~20.04.2","5.15.0-1088.97~20.04.1","5.15.0-1090.99~20.04.1","5.15.0-1091.100~20.04.1","5.15.0-1092.101~20.04.1","5.15.0-1093.102~20.04.1","5.15.0-1095.104~20.04.1","5.15.0-1096.105~20.04.1","5.15.0-1097.106~20.04.1","5.15.0-1098.107~20.04.1","5.15.0-1099.108~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-buildinfo-5.15.0-1100-gcp"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-gcp-5.15-headers-5.15.0-1100"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-gcp-5.15-tools-5.15.0-1100"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-headers-5.15.0-1100-gcp"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-image-unsigned-5.15.0-1100-gcp"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-modules-5.15.0-1100-gcp"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-modules-extra-5.15.0-1100-gcp"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-modules-iwlwifi-5.15.0-1100-gcp"},{"binary_version":"5.15.0-1100.109~20.04.1","binary_name":"linux-tools-5.15.0-1100-gcp"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8033-5.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:Pro:20.04:LTS"}}},{"package":{"name":"linux-oracle-5.15","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle-5.15?arch=source&distro=esm-infra%2Ffocal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1097.103~20.04.1"}]}],"versions":["5.15.0-1007.9~20.04.1","5.15.0-1013.17~20.04.1","5.15.0-1016.20~20.04.1","5.15.0-1017.22~20.04.1","5.15.0-1018.23~20.04.1","5.15.0-1019.24~20.04.1","5.15.0-1021.27~20.04.1","5.15.0-1022.28~20.04.1","5.15.0-1025.31~20.04.2","5.15.0-1027.33~20.04.1","5.15.0-1029.35~20.04.1","5.15.0-1030.36~20.04.1","5.15.0-1032.38~20.04.1","5.15.0-1033.39~20.04.1","5.15.0-1034.40~20.04.1","5.15.0-1035.41~20.04.1","5.15.0-1036.42~20.04.1","5.15.0-1037.43~20.04.1","5.15.0-1038.44~20.04.1","5.15.0-1039.45~20.04.1","5.15.0-1040.46~20.04.1","5.15.0-1041.47~20.04.1","5.15.0-1042.48~20.04.1","5.15.0-1044.50~20.04.1","5.15.0-1045.51~20.04.1","5.15.0-1046.52~20.04.1","5.15.0-1047.53~20.04.1","5.15.0-1048.54~20.04.1","5.15.0-1049.55~20.04.1","5.15.0-1050.56~20.04.1","5.15.0-1051.57~20.04.1","5.15.0-1052.58~20.04.1","5.15.0-1053.59~20.04.1","5.15.0-1054.60~20.04.1","5.15.0-1055.61~20.04.1","5.15.0-1058.64~20.04.1","5.15.0-1059.65~20.04.1","5.15.0-1061.67~20.04.1","5.15.0-1062.68~20.04.1","5.15.0-1063.69~20.04.1","5.15.0-1065.71~20.04.1","5.15.0-1066.72~20.04.1","5.15.0-1067.73~20.04.1","5.15.0-1068.74~20.04.1","5.15.0-1069.75~20.04.1","5.15.0-1070.76~20.04.1","5.15.0-1071.77~20.04.1","5.15.0-1072.78~20.04.1","5.15.0-1073.79~20.04.1","5.15.0-1074.80~20.04.1","5.15.0-1075.81~20.04.1","5.15.0-1076.82~20.04.1","5.15.0-1077.83~20.04.1","5.15.0-1078.84~20.04.1","5.15.0-1079.85~20.04.1","5.15.0-1080.86~20.04.1","5.15.0-1081.87~20.04.1","5.15.0-1083.89~20.04.1","5.15.0-1084.90~20.04.1","5.15.0-1085.91~20.04.3","5.15.0-1086.92~20.04.1","5.15.0-1088.94~20.04.1","5.15.0-1090.96~20.04.1","5.15.0-1091.97~20.04.1","5.15.0-1092.98~20.04.1","5.15.0-1093.99~20.04.1","5.15.0-1094.100~20.04.1","5.15.0-1095.101~20.04.1","5.15.0-1096.102~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-buildinfo-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-headers-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-image-unsigned-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-modules-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-modules-extra-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-oracle-5.15-headers-5.15.0-1097"},{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-oracle-5.15-tools-5.15.0-1097"},{"binary_version":"5.15.0-1097.103~20.04.1","binary_name":"linux-tools-5.15.0-1097-oracle"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8033-5.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:Pro:20.04:LTS"}}},{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1092.97"}]}],"versions":["5.13.0-1004.4","5.13.0-1006.6+22.04.1","5.13.0-1007.7+22.04.1","5.13.0-1010.11+22.04.1","5.15.0-1002.2","5.15.0-1004.4","5.15.0-1005.5","5.15.0-1007.7","5.15.0-1008.8","5.15.0-1010.11","5.15.0-1012.14","5.15.0-1013.16","5.15.0-1016.19","5.15.0-1017.21","5.15.0-1018.22","5.15.0-1019.23","5.15.0-1020.24","5.15.0-1021.26","5.15.0-1024.29","5.15.0-1025.30","5.15.0-1026.31","5.15.0-1028.33","5.15.0-1029.34","5.15.0-1030.35","5.15.0-1031.36","5.15.0-1032.37","5.15.0-1033.38","5.15.0-1034.39","5.15.0-1035.40","5.15.0-1037.42","5.15.0-1038.43","5.15.0-1039.44","5.15.0-1040.45","5.15.0-1041.46","5.15.0-1042.47","5.15.0-1044.49","5.15.0-1045.50","5.15.0-1046.51","5.15.0-1047.52","5.15.0-1048.53","5.15.0-1049.54","5.15.0-1050.55","5.15.0-1051.56","5.15.0-1052.57","5.15.0-1053.58","5.15.0-1054.59","5.15.0-1057.62","5.15.0-1058.63","5.15.0-1059.64","5.15.0-1060.65","5.15.0-1061.66","5.15.0-1062.67","5.15.0-1063.68","5.15.0-1064.69","5.15.0-1065.70","5.15.0-1066.71","5.15.0-1067.72","5.15.0-1068.73","5.15.0-1069.74","5.15.0-1070.75","5.15.0-1071.76","5.15.0-1072.77","5.15.0-1073.78","5.15.0-1076.81","5.15.0-1077.82","5.15.0-1078.83","5.15.0-1079.84","5.15.0-1080.85","5.15.0-1081.86","5.15.0-1082.87","5.15.0-1083.88","5.15.0-1084.89","5.15.0-1085.90","5.15.0-1086.91","5.15.0-1087.92","5.15.0-1088.93","5.15.0-1089.94","5.15.0-1090.95","5.15.0-1091.96"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1092.97","binary_name":"linux-buildinfo-5.15.0-1092-kvm"},{"binary_version":"5.15.0-1092.97","binary_name":"linux-headers-5.15.0-1092-kvm"},{"binary_version":"5.15.0-1092.97","binary_name":"linux-image-unsigned-5.15.0-1092-kvm"},{"binary_version":"5.15.0-1092.97","binary_name":"linux-kvm-headers-5.15.0-1092"},{"binary_version":"5.15.0-1092.97","binary_name":"linux-kvm-tools-5.15.0-1092"},{"binary_version":"5.15.0-1092.97","binary_name":"linux-modules-5.15.0-1092-kvm"},{"binary_version":"5.15.0-1092.97","binary_name":"linux-tools-5.15.0-1092-kvm"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8033-5.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"linux-oracle","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1097.103"}]}],"versions":["5.13.0-1008.10","5.15.0-1001.3","5.15.0-1002.4","5.15.0-1003.5","5.15.0-1006.8","5.15.0-1007.9","5.15.0-1009.12","5.15.0-1011.15","5.15.0-1013.17","5.15.0-1016.20","5.15.0-1017.22","5.15.0-1018.23","5.15.0-1019.24","5.15.0-1021.27","5.15.0-1022.28","5.15.0-1025.31","5.15.0-1026.32","5.15.0-1027.33","5.15.0-1029.35","5.15.0-1030.36","5.15.0-1032.38","5.15.0-1033.39","5.15.0-1034.40","5.15.0-1035.41","5.15.0-1036.42","5.15.0-1037.43","5.15.0-1038.44","5.15.0-1039.45","5.15.0-1040.46","5.15.0-1041.47","5.15.0-1042.48","5.15.0-1044.50","5.15.0-1045.51","5.15.0-1046.52","5.15.0-1047.53","5.15.0-1048.54","5.15.0-1049.55","5.15.0-1050.56","5.15.0-1051.57","5.15.0-1052.58","5.15.0-1053.59","5.15.0-1054.60","5.15.0-1055.61","5.15.0-1058.64","5.15.0-1059.65","5.15.0-1060.66","5.15.0-1061.67","5.15.0-1062.68","5.15.0-1063.69","5.15.0-1064.70","5.15.0-1065.71","5.15.0-1066.72","5.15.0-1067.73","5.15.0-1068.74","5.15.0-1069.75","5.15.0-1070.76","5.15.0-1071.77","5.15.0-1072.78","5.15.0-1073.79","5.15.0-1074.80","5.15.0-1075.81","5.15.0-1076.82","5.15.0-1077.83","5.15.0-1078.84","5.15.0-1079.85","5.15.0-1080.86","5.15.0-1081.87","5.15.0-1082.88","5.15.0-1083.89","5.15.0-1084.90","5.15.0-1085.91","5.15.0-1086.92","5.15.0-1088.94","5.15.0-1089.95","5.15.0-1090.96","5.15.0-1091.97","5.15.0-1092.98","5.15.0-1093.99","5.15.0-1094.100","5.15.0-1095.101","5.15.0-1096.102"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-1097.103","binary_name":"linux-buildinfo-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103","binary_name":"linux-headers-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103","binary_name":"linux-image-unsigned-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103","binary_name":"linux-modules-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103","binary_name":"linux-modules-extra-5.15.0-1097-oracle"},{"binary_version":"5.15.0-1097.103","binary_name":"linux-oracle-headers-5.15.0-1097"},{"binary_version":"5.15.0-1097.103","binary_name":"linux-oracle-tools-5.15.0-1097"},{"binary_version":"5.15.0-1097.103","binary_name":"linux-tools-5.15.0-1097-oracle"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8033-5.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.5"}