Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (8)

linux-image-unsigned-5.17.0-1026-oem

Hashes
Linux kernel image for version 5.17.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.17.0 on 64 bit x86 SMP. Supports OEM processors. Geared toward desktops and laptops. You likely do not want to install this package directly. Instead, install the linux-oem meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 27498b2cb28da7e96897079862c5ab1aa163383d4d0d2dd72f6996863c4b9ca8
  • SHA1: c89335923a4902ef94a9ab2012aab465d476f94e
  • MD5: 54f6e388ac2db088dc3f4a488275f238
Information
  • Version: 5.17.0-1026.27
  • Filename: linux-image-unsigned-5.17.0-1026-oem_5.17.0-1026.27_amd64.deb
  • Size: 11336
  • Type: DEB
  • Source: linux-oem-5.17
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1026-oem

Vulnerabilities

Raw Object

{
  "sha256": "27498b2cb28da7e96897079862c5ab1aa163383d4d0d2dd72f6996863c4b9ca8",
  "sha1": "c89335923a4902ef94a9ab2012aab465d476f94e",
  "md5": "54f6e388ac2db088dc3f4a488275f238",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.17.0-1026-oem",
  "filename": "linux-image-unsigned-5.17.0-1026-oem_5.17.0-1026.27_amd64.deb",
  "size": 11336,
  "description": "Linux kernel image for version 5.17.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.17.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.17.0-1026.27",
  "source": "linux-oem-5.17",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1026-oem",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:29:30+00:00",
      "updated_at": "2023-02-10T10:29:30+00:00"
    },
    {
      "name": "CVE-2022-42895",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:31:37+00:00",
      "updated_at": "2023-02-10T10:31:37+00:00"
    },
    {
      "name": "CVE-2023-0179",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:31:44+00:00",
      "updated_at": "2023-02-10T10:31:44+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:37:37+00:00",
      "updated_at": "2023-02-10T10:37:37+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9cc2746b4414be6d8abd572b96ea4413956dbfc5b8ae67befaf378fb5f5d61f8",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1027.28",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1027.28_all.deb"
      },
      "created_at": "2023-02-11T12:06:56+00:00",
      "updated_at": "2023-02-11T12:06:56+00:00"
    },
    {
      "name": "CVE-2022-42895",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9cc2746b4414be6d8abd572b96ea4413956dbfc5b8ae67befaf378fb5f5d61f8",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1027.28",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1027.28_all.deb"
      },
      "created_at": "2023-02-11T12:07:11+00:00",
      "updated_at": "2023-02-11T12:07:11+00:00"
    },
    {
      "name": "CVE-2023-0179",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9cc2746b4414be6d8abd572b96ea4413956dbfc5b8ae67befaf378fb5f5d61f8",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1027.28",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1027.28_all.deb"
      },
      "created_at": "2023-02-11T12:25:31+00:00",
      "updated_at": "2023-02-11T12:25:31+00:00"
    },
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9cc2746b4414be6d8abd572b96ea4413956dbfc5b8ae67befaf378fb5f5d61f8",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1027.28",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1027.28_all.deb"
      },
      "created_at": "2023-02-11T12:28:55+00:00",
      "updated_at": "2023-02-11T12:28:55+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2023-01-04T11:13:15+00:00",
  "updated_at": "2023-01-07T10:54:48+00:00",
  "deleted_at": null
}