3ebfb91a0d35b02a1769c98240671ba1ef6bde8f01c5c0a5d10f13503ff78b65
36a9a732e17f2d587716c2ec23df78345fcfed62
0211ccc1d81c4bb62d6812ab2e734d26
6.1.0-1004.4
linux-image-unsigned-6.1.0-1004-oem_6.1.0-1004.4_amd64.deb
12185
DEB
linux-oem-6.1
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-6.1.0-1004-oem
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-28328 | 0 | USN | |
CVE-2023-0179 | 8 | USN | |
CVE-2022-3424 | 8 | USN | |
CVE-2023-0179 | 8 | USN | linux-oem-6.1-tools-host 6.1.0-1006.6 |
CVE-2022-3424 | 8 | USN | linux-oem-6.1-tools-host 6.1.0-1006.6 |
CVE-2023-28328 | 0 | USN | linux-oem-6.1-tools-host 6.1.0-1006.6 |
CVE-2023-22997 | 6 | USN | linux-oem-6.1-tools-host 6.1.0-1006.6 |
CVE-2023-26606 | 8 | USN | linux-oem-6.1-tools-host 6.1.0-1006.6 |
CVE-2023-22997 | 6 | USN | |
CVE-2023-26606 | 8 | USN | |
CVE-2023-3357 | 0 | USN | linux-oem-6.1-tools-host 6.1.0-1006.6 |
{ "sha256": "3ebfb91a0d35b02a1769c98240671ba1ef6bde8f01c5c0a5d10f13503ff78b65", "sha1": "36a9a732e17f2d587716c2ec23df78345fcfed62", "md5": "0211ccc1d81c4bb62d6812ab2e734d26", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-6.1.0-1004-oem", "filename": "linux-image-unsigned-6.1.0-1004-oem_6.1.0-1004.4_amd64.deb", "size": 12185, "description": "Linux kernel image for version 6.1.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 6.1.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "6.1.0-1004.4", "source": "linux-oem-6.1", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-6.1.0-1004-oem", "applications": [], "vulnerabilities": [ { "name": "CVE-2023-28328", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-12T10:12:43+00:00", "updated_at": "2023-06-12T10:12:43+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:32:49+00:00", "updated_at": "2023-02-10T10:32:49+00:00" }, { "name": "CVE-2022-3424", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:33:57+00:00", "updated_at": "2023-02-10T10:33:57+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "bbd73b52d2431a0545ded140d6f13fce565d41a38a45b8cfe27ef94d52301731", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1006.6", "filename": "linux-oem-6.1-tools-host_6.1.0-1006.6_all.deb" }, "created_at": "2023-03-16T10:55:53+00:00", "updated_at": "2023-03-16T10:55:53+00:00" }, { "name": "CVE-2022-3424", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "bbd73b52d2431a0545ded140d6f13fce565d41a38a45b8cfe27ef94d52301731", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1006.6", "filename": "linux-oem-6.1-tools-host_6.1.0-1006.6_all.deb" }, "created_at": "2023-03-16T11:13:18+00:00", "updated_at": "2023-03-16T11:13:18+00:00" }, { "name": "CVE-2023-28328", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "bbd73b52d2431a0545ded140d6f13fce565d41a38a45b8cfe27ef94d52301731", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1006.6", "filename": "linux-oem-6.1-tools-host_6.1.0-1006.6_all.deb" }, "created_at": "2023-04-21T09:24:45+00:00", "updated_at": "2023-04-21T09:24:45+00:00" }, { "name": "CVE-2023-22997", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "bbd73b52d2431a0545ded140d6f13fce565d41a38a45b8cfe27ef94d52301731", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1006.6", "filename": "linux-oem-6.1-tools-host_6.1.0-1006.6_all.deb" }, "created_at": "2023-04-21T09:27:10+00:00", "updated_at": "2023-04-21T09:27:10+00:00" }, { "name": "CVE-2023-26606", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "bbd73b52d2431a0545ded140d6f13fce565d41a38a45b8cfe27ef94d52301731", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1006.6", "filename": "linux-oem-6.1-tools-host_6.1.0-1006.6_all.deb" }, "created_at": "2023-04-21T09:38:22+00:00", "updated_at": "2023-04-21T09:38:22+00:00" }, { "name": "CVE-2023-22997", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-17T13:00:21+00:00", "updated_at": "2023-06-17T13:00:21+00:00" }, { "name": "CVE-2023-26606", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-17T13:56:52+00:00", "updated_at": "2023-06-17T13:56:52+00:00" }, { "name": "CVE-2023-3357", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "bbd73b52d2431a0545ded140d6f13fce565d41a38a45b8cfe27ef94d52301731", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1006.6", "filename": "linux-oem-6.1-tools-host_6.1.0-1006.6_all.deb" }, "created_at": "2023-07-12T09:59:29+00:00", "updated_at": "2023-07-12T09:59:29+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-01-05T13:54:04+00:00", "updated_at": "2023-01-07T11:14:35+00:00", "deleted_at": null }