e848f4536deaa3e9602ea07a17e5ccbabbb86f7055fcb6f0fb0eea952c21fc42
aa2f9bc3a1da5000f0998247243ce156831570d7
c2f58b5ccbe2d37fe84bf0d1e90c8508
5.14.0-1047.54
linux-image-unsigned-5.14.0-1047-oem_5.14.0-1047.54_amd64.deb
9130
DEB
linux-oem-5.14
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.14.0-1047-oem
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2588 | 0 | USN | linux-oem-5.14-tools-host 5.14.0-1048.55 |
CVE-2022-2586 | 0 | USN | linux-oem-5.14-tools-host 5.14.0-1048.55 |
CVE-2022-2585 | 0 | USN | linux-oem-5.14-tools-host 5.14.0-1048.55 |
CVE-2021-33061 | 55 | USN | linux-oem-5.14-tools-host 5.14.0-1049.56 |
CVE-2021-33655 | 78 | USN | linux-oem-5.14-tools-host 5.14.0-1049.56 |
{ "sha256": "e848f4536deaa3e9602ea07a17e5ccbabbb86f7055fcb6f0fb0eea952c21fc42", "sha1": "aa2f9bc3a1da5000f0998247243ce156831570d7", "md5": "c2f58b5ccbe2d37fe84bf0d1e90c8508", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-5.14.0-1047-oem", "filename": "linux-image-unsigned-5.14.0-1047-oem_5.14.0-1047.54_amd64.deb", "size": 9130, "description": "Linux kernel image for version 5.14.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.14.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "5.14.0-1047.54", "source": "linux-oem-5.14", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.14.0-1047-oem", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-2588", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "374aa277d30ed4f0a8491dd59ecc48d258483f9bf4fc04ef4d936ebc9d88514c", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1048.55", "filename": "linux-oem-5.14-tools-host_5.14.0-1048.55_all.deb" }, "created_at": "2022-08-11T03:03:53+00:00", "updated_at": "2022-08-11T03:03:53+00:00" }, { "name": "CVE-2022-2586", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "374aa277d30ed4f0a8491dd59ecc48d258483f9bf4fc04ef4d936ebc9d88514c", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1048.55", "filename": "linux-oem-5.14-tools-host_5.14.0-1048.55_all.deb" }, "created_at": "2022-08-11T03:16:09+00:00", "updated_at": "2022-08-11T03:16:09+00:00" }, { "name": "CVE-2022-2585", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "374aa277d30ed4f0a8491dd59ecc48d258483f9bf4fc04ef4d936ebc9d88514c", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1048.55", "filename": "linux-oem-5.14-tools-host_5.14.0-1048.55_all.deb" }, "created_at": "2022-08-11T03:57:42+00:00", "updated_at": "2022-08-11T03:57:42+00:00" }, { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "fb8a408756bc1ae0110fdbdf70b1892674c19f992b3b629d0545661986568c53", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1049.56", "filename": "linux-oem-5.14-tools-host_5.14.0-1049.56_all.deb" }, "created_at": "2022-08-25T03:00:33+00:00", "updated_at": "2022-08-25T03:00:33+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "fb8a408756bc1ae0110fdbdf70b1892674c19f992b3b629d0545661986568c53", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1049.56", "filename": "linux-oem-5.14-tools-host_5.14.0-1049.56_all.deb" }, "created_at": "2022-08-25T03:00:36+00:00", "updated_at": "2022-08-25T03:00:36+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-28T12:48:54+00:00", "updated_at": "2022-07-29T03:54:06+00:00", "deleted_at": null }