Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (21)

linux-image-unsigned-5.17.0-1021-oem

Hashes
Linux kernel image for version 5.17.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.17.0 on 64 bit x86 SMP. Supports OEM processors. Geared toward desktops and laptops. You likely do not want to install this package directly. Instead, install the linux-oem meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 7fd7ee40bf31e4b09dbfc2a865a6024309edda5c9b760c12afc51347c075acc0
  • SHA1: 4f6a2e765d3b3ff8fe84afd8dcc09bed5d30b39a
  • MD5: 2a4839d3c66b36396d73ba88e6665436
Information
  • Version: 5.17.0-1021.22
  • Filename: linux-image-unsigned-5.17.0-1021-oem_5.17.0-1021.22_amd64.deb
  • Size: 11330
  • Type: DEB
  • Source: linux-oem-5.17
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1021-oem

Vulnerabilities

NameRiskSourceFixed
CVE-2022-36218USN
CVE-2022-337430USN
CVE-2022-356771USN
CVE-2022-352475USN
CVE-2022-263650USN
CVE-2022-439458USN
CVE-2022-359475USN
CVE-2022-356671USN
CVE-2022-4270355USN
CVE-2022-356480USN
CVE-2022-428969USN
linux-oem-5.17-tools-host
5.17.0-1025.26
CVE-2022-263650USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-439458USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-337430USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-4270355USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-356480USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-36218USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-356771USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-352475USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-356671USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-359475USN
linux-oem-5.17-tools-host
5.17.0-1024.25

Raw Object

{
  "sha256": "7fd7ee40bf31e4b09dbfc2a865a6024309edda5c9b760c12afc51347c075acc0",
  "sha1": "4f6a2e765d3b3ff8fe84afd8dcc09bed5d30b39a",
  "md5": "2a4839d3c66b36396d73ba88e6665436",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.17.0-1021-oem",
  "filename": "linux-image-unsigned-5.17.0-1021-oem_5.17.0-1021.22_amd64.deb",
  "size": 11330,
  "description": "Linux kernel image for version 5.17.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.17.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.17.0-1021.22",
  "source": "linux-oem-5.17",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1021-oem",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:32:30+00:00",
      "updated_at": "2022-12-13T10:32:30+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:33:03+00:00",
      "updated_at": "2022-12-13T10:33:03+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:33:36+00:00",
      "updated_at": "2022-12-13T10:33:36+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:34:07+00:00",
      "updated_at": "2022-12-13T10:34:07+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:34:46+00:00",
      "updated_at": "2022-12-13T10:34:46+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:35:26+00:00",
      "updated_at": "2022-12-13T10:35:26+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:36:26+00:00",
      "updated_at": "2022-12-13T10:36:26+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:37:23+00:00",
      "updated_at": "2022-12-13T10:37:23+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:37:54+00:00",
      "updated_at": "2022-12-13T10:37:54+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:38:30+00:00",
      "updated_at": "2022-12-13T10:38:30+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e41bbb4ccc0bae14d24aaa6d5a229c7ee98e5dea43cd34195b723f9277b8681e",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1025.26",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1025.26_all.deb"
      },
      "created_at": "2022-12-17T11:08:27+00:00",
      "updated_at": "2022-12-17T11:08:27+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-18T10:46:13+00:00",
      "updated_at": "2022-12-18T10:46:13+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-18T10:46:43+00:00",
      "updated_at": "2022-12-18T10:46:43+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-18T10:46:49+00:00",
      "updated_at": "2022-12-18T10:46:49+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-18T10:49:16+00:00",
      "updated_at": "2022-12-18T10:49:16+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-18T10:49:59+00:00",
      "updated_at": "2022-12-18T10:49:59+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2023-01-06T11:38:06+00:00",
      "updated_at": "2023-01-06T11:38:06+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2023-01-06T12:04:13+00:00",
      "updated_at": "2023-01-06T12:04:13+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2023-01-06T12:16:37+00:00",
      "updated_at": "2023-01-06T12:16:37+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2023-01-06T13:31:52+00:00",
      "updated_at": "2023-01-06T13:31:52+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2023-01-06T15:15:03+00:00",
      "updated_at": "2023-01-06T15:15:03+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-11-03T10:04:17+00:00",
  "updated_at": "2022-11-05T11:09:31+00:00",
  "deleted_at": null
}