Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (14)

linux-image-unsigned-6.1.0-1006-oem

Hashes
Linux kernel image for version 6.1.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 6.1.0 on 64 bit x86 SMP. Supports OEM processors. Geared toward desktops and laptops. You likely do not want to install this package directly. Instead, install the linux-oem meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 4dcca82f32bb8379ccf5fc7c04f1716a2042f9408f865c51b1d7d41729590af5
  • SHA1: 55ddf6ea9deae2f374f36f5928909989c2310eb5
  • MD5: 58ce64ab1480341ee0cd84ac14cd15cc
Information
  • Version: 6.1.0-1006.6
  • Filename: linux-image-unsigned-6.1.0-1006-oem_6.1.0-1006.6_amd64.deb
  • Size: 12222
  • Type: DEB
  • Source: linux-oem-6.1
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-6.1.0-1006-oem

Vulnerabilities

Raw Object

{
  "sha256": "4dcca82f32bb8379ccf5fc7c04f1716a2042f9408f865c51b1d7d41729590af5",
  "sha1": "55ddf6ea9deae2f374f36f5928909989c2310eb5",
  "md5": "58ce64ab1480341ee0cd84ac14cd15cc",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-6.1.0-1006-oem",
  "filename": "linux-image-unsigned-6.1.0-1006-oem_6.1.0-1006.6_amd64.deb",
  "size": 12222,
  "description": "Linux kernel image for version 6.1.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 6.1.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "6.1.0-1006.6",
  "source": "linux-oem-6.1",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-6.1.0-1006-oem",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2023-0210",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:33:42+00:00",
      "updated_at": "2023-03-03T10:33:42+00:00"
    },
    {
      "name": "CVE-2022-3707",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:49:32+00:00",
      "updated_at": "2023-03-03T10:49:32+00:00"
    },
    {
      "name": "CVE-2023-0461",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:51:26+00:00",
      "updated_at": "2023-03-03T10:51:26+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:53:11+00:00",
      "updated_at": "2023-03-03T10:53:11+00:00"
    },
    {
      "name": "CVE-2022-47929",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:55:29+00:00",
      "updated_at": "2023-03-03T10:55:29+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:16:38+00:00",
      "updated_at": "2023-03-03T11:16:38+00:00"
    },
    {
      "name": "CVE-2022-4379",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:18:28+00:00",
      "updated_at": "2023-03-03T11:18:28+00:00"
    },
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:18:32+00:00",
      "updated_at": "2023-03-03T11:18:32+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:18:38+00:00",
      "updated_at": "2023-03-03T11:18:38+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:18:38+00:00",
      "updated_at": "2023-03-03T11:18:38+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:19:03+00:00",
      "updated_at": "2023-03-03T11:19:03+00:00"
    },
    {
      "name": "CVE-2022-48423",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:27:36+00:00",
      "updated_at": "2023-04-21T09:27:36+00:00"
    },
    {
      "name": "CVE-2022-48424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:28:00+00:00",
      "updated_at": "2023-04-21T09:28:00+00:00"
    },
    {
      "name": "CVE-2023-26544",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:36:22+00:00",
      "updated_at": "2023-04-21T09:36:22+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2023-01-24T19:05:10+00:00",
  "updated_at": "2023-02-11T12:02:36+00:00",
  "deleted_at": null
}