7fd7ee40bf31e4b09dbfc2a865a6024309edda5c9b760c12afc51347c075acc0
4f6a2e765d3b3ff8fe84afd8dcc09bed5d30b39a
2a4839d3c66b36396d73ba88e6665436
5.17.0-1021.22
linux-image-unsigned-5.17.0-1021-oem_5.17.0-1021.22_amd64.deb
11330
DEB
linux-oem-5.17
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1021-oem
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3621 | 8 | USN | |
CVE-2022-33743 | 0 | USN | |
CVE-2022-3567 | 71 | USN | |
CVE-2022-3524 | 75 | USN | |
CVE-2022-26365 | 0 | USN | |
CVE-2022-43945 | 8 | USN | |
CVE-2022-3594 | 75 | USN | |
CVE-2022-3566 | 71 | USN | |
CVE-2022-42703 | 55 | USN | |
CVE-2022-3564 | 80 | USN | |
CVE-2022-42896 | 9 | USN | linux-oem-5.17-tools-host 5.17.0-1025.26 |
CVE-2022-26365 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-43945 | 8 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-33743 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-42703 | 55 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-3564 | 80 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-3621 | 8 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-3567 | 71 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-3524 | 75 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-3566 | 71 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
CVE-2022-3594 | 75 | USN | linux-oem-5.17-tools-host 5.17.0-1024.25 |
{ "sha256": "7fd7ee40bf31e4b09dbfc2a865a6024309edda5c9b760c12afc51347c075acc0", "sha1": "4f6a2e765d3b3ff8fe84afd8dcc09bed5d30b39a", "md5": "2a4839d3c66b36396d73ba88e6665436", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-5.17.0-1021-oem", "filename": "linux-image-unsigned-5.17.0-1021-oem_5.17.0-1021.22_amd64.deb", "size": 11330, "description": "Linux kernel image for version 5.17.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.17.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "5.17.0-1021.22", "source": "linux-oem-5.17", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1021-oem", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:32:30+00:00", "updated_at": "2022-12-13T10:32:30+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:33:03+00:00", "updated_at": "2022-12-13T10:33:03+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:33:36+00:00", "updated_at": "2022-12-13T10:33:36+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:34:07+00:00", "updated_at": "2022-12-13T10:34:07+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:34:46+00:00", "updated_at": "2022-12-13T10:34:46+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:35:26+00:00", "updated_at": "2022-12-13T10:35:26+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:36:26+00:00", "updated_at": "2022-12-13T10:36:26+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:37:23+00:00", "updated_at": "2022-12-13T10:37:23+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:37:54+00:00", "updated_at": "2022-12-13T10:37:54+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-13T10:38:30+00:00", "updated_at": "2022-12-13T10:38:30+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "e41bbb4ccc0bae14d24aaa6d5a229c7ee98e5dea43cd34195b723f9277b8681e", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1025.26", "filename": "linux-oem-5.17-tools-host_5.17.0-1025.26_all.deb" }, "created_at": "2022-12-17T11:08:27+00:00", "updated_at": "2022-12-17T11:08:27+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2022-12-18T10:46:13+00:00", "updated_at": "2022-12-18T10:46:13+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2022-12-18T10:46:43+00:00", "updated_at": "2022-12-18T10:46:43+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2022-12-18T10:46:49+00:00", "updated_at": "2022-12-18T10:46:49+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2022-12-18T10:49:16+00:00", "updated_at": "2022-12-18T10:49:16+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2022-12-18T10:49:59+00:00", "updated_at": "2022-12-18T10:49:59+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2023-01-06T11:38:06+00:00", "updated_at": "2023-01-06T11:38:06+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2023-01-06T12:04:13+00:00", "updated_at": "2023-01-06T12:04:13+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2023-01-06T12:16:37+00:00", "updated_at": "2023-01-06T12:16:37+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2023-01-06T13:31:52+00:00", "updated_at": "2023-01-06T13:31:52+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1024.25", "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb" }, "created_at": "2023-01-06T15:15:03+00:00", "updated_at": "2023-01-06T15:15:03+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-11-03T10:04:17+00:00", "updated_at": "2022-11-05T11:09:31+00:00", "deleted_at": null }