dba1b963adf21961a970f3e968de4e4c1a58d05a578563e3cac303edb3296fe4
d0a14a50d2cdec3c8f8c08689e76f283c53d94c6
09a276d6ff83c019ddce1616a528a145
5.14.0-1056.63
linux-oem-5.14-headers-5.14.0-1056_5.14.0-1056.63_all.deb
74876
DEB
linux-oem-5.14
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
coreutils
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3545 | 78 | USN | |
CVE-2022-42895 | 6 | USN | |
CVE-2023-0179 | 8 | USN | |
CVE-2022-4139 | 0 | USN | |
CVE-2022-42895 | 6 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
CVE-2022-4139 | 0 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
CVE-2023-0179 | 8 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
CVE-2022-3545 | 78 | USN | linux-oem-5.14-tools-host 5.14.0-1057.64 |
{ "sha256": "dba1b963adf21961a970f3e968de4e4c1a58d05a578563e3cac303edb3296fe4", "sha1": "d0a14a50d2cdec3c8f8c08689e76f283c53d94c6", "md5": "09a276d6ff83c019ddce1616a528a145", "type": "DEB", "arch": "ALL", "name": "linux-oem-5.14-headers-5.14.0-1056", "filename": "linux-oem-5.14-headers-5.14.0-1056_5.14.0-1056.63_all.deb", "size": 74876, "description": "Header files related to Linux kernel version 5.14.0\nThis package provides kernel header files for version 5.14.0, for sites\nthat want the latest kernel headers. Please read\n/usr/share/doc/linux-oem-5.14-headers-5.14.0-1056/debian.README.gz for details", "url": null, "version": "5.14.0-1056.63", "source": "linux-oem-5.14", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "coreutils", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3545", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:28:59+00:00", "updated_at": "2023-02-10T10:28:59+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:31:37+00:00", "updated_at": "2023-02-10T10:31:37+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:31:44+00:00", "updated_at": "2023-02-10T10:31:44+00:00" }, { "name": "CVE-2022-4139", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:40:05+00:00", "updated_at": "2023-02-10T10:40:05+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:07:11+00:00", "updated_at": "2023-02-11T12:07:11+00:00" }, { "name": "CVE-2022-4139", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:19:13+00:00", "updated_at": "2023-02-11T12:19:13+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:25:30+00:00", "updated_at": "2023-02-11T12:25:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "ef1ff0148d74cb88e908a4d5834e6abba24e9640e31021fd57bff580bf499be0", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1057.64", "filename": "linux-oem-5.14-tools-host_5.14.0-1057.64_all.deb" }, "created_at": "2023-02-11T12:28:55+00:00", "updated_at": "2023-02-11T12:28:55+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-16T15:52:18+00:00", "updated_at": "2022-12-18T10:29:50+00:00", "deleted_at": null }