Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (16)

linux-image-unsigned-5.15.0-1026-kvm

Hashes
Linux kernel image for version 5.15.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.15.0 on 64 bit x86 SMP. Supports amd64 processors. Geared toward virtual systems. You likely do not want to install this package directly. Instead, install the linux-kvm meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: fcc297020fe95f6eb14762f4c99bb6503303af09f1c65ab23b25d1997aefa111
  • SHA1: 1622a679e55b74673674c7fbbfa4cbf776f318ac
  • MD5: 4cf0b4fda2c43c4242d31a5fd8154b7f
Information
  • Version: 5.15.0-1026.31
  • Filename: linux-image-unsigned-5.15.0-1026-kvm_5.15.0-1026.31_amd64.deb
  • Size: 7201
  • Type: DEB
  • Source: linux-kvm
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.15.0-1026-kvm

Vulnerabilities

Raw Object

{
  "sha256": "fcc297020fe95f6eb14762f4c99bb6503303af09f1c65ab23b25d1997aefa111",
  "sha1": "1622a679e55b74673674c7fbbfa4cbf776f318ac",
  "md5": "4cf0b4fda2c43c4242d31a5fd8154b7f",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.15.0-1026-kvm",
  "filename": "linux-image-unsigned-5.15.0-1026-kvm_5.15.0-1026.31_amd64.deb",
  "size": 7201,
  "description": "Linux kernel image for version 5.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.15.0 on\n64 bit x86 SMP.\n\nSupports amd64 processors.\n\nGeared toward virtual systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-kvm meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.15.0-1026.31",
  "source": "linux-kvm",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.15.0-1026-kvm",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3628",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:17:16+00:00",
      "updated_at": "2023-02-10T10:17:16+00:00"
    },
    {
      "name": "CVE-2022-3543",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:22:53+00:00",
      "updated_at": "2023-02-10T10:22:53+00:00"
    },
    {
      "name": "CVE-2022-3623",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:27:54+00:00",
      "updated_at": "2023-02-10T10:27:54+00:00"
    },
    {
      "name": "CVE-2022-3640",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:30:11+00:00",
      "updated_at": "2023-02-10T10:30:11+00:00"
    },
    {
      "name": "CVE-2022-42895",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:31:30+00:00",
      "updated_at": "2023-02-10T10:31:30+00:00"
    },
    {
      "name": "CVE-2023-0590",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:32:52+00:00",
      "updated_at": "2023-02-10T10:32:52+00:00"
    },
    {
      "name": "CVE-2022-3619",
      "risk": 43,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:32:59+00:00",
      "updated_at": "2023-02-10T10:32:59+00:00"
    },
    {
      "name": "CVE-2022-41850",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:35:02+00:00",
      "updated_at": "2023-02-10T10:35:02+00:00"
    },
    {
      "name": "CVE-2022-47940",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:39:34+00:00",
      "updated_at": "2023-02-10T10:39:34+00:00"
    },
    {
      "name": "CVE-2022-41849",
      "risk": 42,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-10T10:41:16+00:00",
      "updated_at": "2023-02-10T10:41:16+00:00"
    },
    {
      "name": "CVE-2023-22998",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:28:51+00:00",
      "updated_at": "2023-04-21T09:28:51+00:00"
    },
    {
      "name": "CVE-2023-1829",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-02T09:08:03+00:00",
      "updated_at": "2023-05-02T09:08:03+00:00"
    },
    {
      "name": "CVE-2023-1872",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-02T09:09:34+00:00",
      "updated_at": "2023-05-02T09:09:34+00:00"
    },
    {
      "name": "CVE-2022-1184",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-06-06T10:06:16+00:00",
      "updated_at": "2023-06-06T10:06:16+00:00"
    },
    {
      "name": "CVE-2023-3006",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-07-12T10:07:00+00:00",
      "updated_at": "2023-07-12T10:07:00+00:00"
    },
    {
      "name": "CVE-2023-3812",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-08-09T09:33:02+00:00",
      "updated_at": "2023-08-09T09:33:02+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2023-01-06T16:28:39+00:00",
  "updated_at": "2023-01-14T10:14:55+00:00",
  "deleted_at": null
}