da3ae521191d1011e68e052c00916765082b518c41fa06c2d6be6de9dfe26dda
be6482229cf0be37e635305da48235c6ec946e2b
cdc2e0a9eb0f0ec14433864dbbdc506c
5.14.0-1027.30
linux-image-unsigned-5.14.0-1027-oem_5.14.0-1027.30_amd64.deb
9020
DEB
linux-oem-5.14
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.14.0-1027-oem
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-0742 | 78 | USN | |
CVE-2022-0742 | 78 | USN | linux-oem-5.14-tools-host 5.14.0-1029.32 |
CVE-2022-3545 | 78 | USN | |
CVE-2022-42895 | 6 | USN | |
CVE-2023-0179 | 8 | USN | |
CVE-2022-4139 | 0 | USN | |
CVE-2022-42895 | 6 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
CVE-2022-4139 | 0 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
CVE-2023-0179 | 8 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
CVE-2022-3545 | 78 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
{ "sha256": "da3ae521191d1011e68e052c00916765082b518c41fa06c2d6be6de9dfe26dda", "sha1": "be6482229cf0be37e635305da48235c6ec946e2b", "md5": "cdc2e0a9eb0f0ec14433864dbbdc506c", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-5.14.0-1027-oem", "filename": "linux-image-unsigned-5.14.0-1027-oem_5.14.0-1027.30_amd64.deb", "size": 9020, "description": "Linux kernel image for version 5.14.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.14.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "5.14.0-1027.30", "source": "linux-oem-5.14", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.14.0-1027-oem", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-0742", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-03-25T04:08:26+00:00", "updated_at": "2022-03-25T04:08:26+00:00" }, { "name": "CVE-2022-0742", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "b5be64ead6c2e22cdb625c6f9073cb0269e211a038f94caa6d3944bd8b8713b5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1029.32", "filename": "linux-oem-5.14-tools-host_5.14.0-1029.32_all.deb" }, "created_at": "2022-03-27T02:28:07+00:00", "updated_at": "2022-03-27T02:28:07+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:28:59+00:00", "updated_at": "2023-02-10T10:28:59+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:31:37+00:00", "updated_at": "2023-02-10T10:31:37+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:31:44+00:00", "updated_at": "2023-02-10T10:31:44+00:00" }, { "name": "CVE-2022-4139", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:40:05+00:00", "updated_at": "2023-02-10T10:40:05+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:07:11+00:00", "updated_at": "2023-02-11T12:07:11+00:00" }, { "name": "CVE-2022-4139", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:19:13+00:00", "updated_at": "2023-02-11T12:19:13+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:25:30+00:00", "updated_at": "2023-02-11T12:25:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:28:55+00:00", "updated_at": "2023-02-11T12:28:55+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-03-07T16:20:15+00:00", "updated_at": "2022-03-09T04:32:28+00:00", "deleted_at": null }