Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (21)

linux-buildinfo-5.17.0-1021-oem

Hashes
Linux kernel buildinfo for version 5.17.0 on 64 bit x86 SMP This package contains the Linux kernel buildinfo for version 5.17.0 on 64 bit x86 SMP. You likely do not want to install this package.
  • SHA256: c38f7f116d5571339a84bb09870bfa51932fc388770b94d83dcaa67e0bc71ac8
  • SHA1: 3b29a65737ab628f77c55ce213f2cbb3cc33db76
  • MD5: c97c4a4b2c39e8134262fc0fdcca3481
Information
  • Version: 5.17.0-1021.22
  • Filename: linux-buildinfo-5.17.0-1021-oem_5.17.0-1021.22_amd64.deb
  • Size: 2519
  • Type: DEB
  • Source: linux-oem-5.17
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>

Vulnerabilities

NameRiskSourceFixed
CVE-2022-36218USN
CVE-2022-337430USN
CVE-2022-356771USN
CVE-2022-352475USN
CVE-2022-263650USN
CVE-2022-439458USN
CVE-2022-359475USN
CVE-2022-356671USN
CVE-2022-4270355USN
CVE-2022-356480USN
CVE-2022-36218USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-439458USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-356671USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-356771USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-337430USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-263650USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-4270355USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-356480USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-359475USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-352475USN
linux-oem-5.17-tools-host
5.17.0-1024.25
CVE-2022-428969USN
linux-oem-5.17-tools-host
5.17.0-1025.26

Raw Object

{
  "sha256": "c38f7f116d5571339a84bb09870bfa51932fc388770b94d83dcaa67e0bc71ac8",
  "sha1": "3b29a65737ab628f77c55ce213f2cbb3cc33db76",
  "md5": "c97c4a4b2c39e8134262fc0fdcca3481",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-buildinfo-5.17.0-1021-oem",
  "filename": "linux-buildinfo-5.17.0-1021-oem_5.17.0-1021.22_amd64.deb",
  "size": 2519,
  "description": "Linux kernel buildinfo for version 5.17.0 on 64 bit x86 SMP\nThis package contains the Linux kernel buildinfo for version 5.17.0 on\n64 bit x86 SMP.\n\nYou likely do not want to install this package.",
  "url": null,
  "version": "5.17.0-1021.22",
  "source": "linux-oem-5.17",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": null,
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:31:44+00:00",
      "updated_at": "2022-12-13T10:31:44+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:33:03+00:00",
      "updated_at": "2022-12-13T10:33:03+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:33:35+00:00",
      "updated_at": "2022-12-13T10:33:35+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:34:07+00:00",
      "updated_at": "2022-12-13T10:34:07+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:34:46+00:00",
      "updated_at": "2022-12-13T10:34:46+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:35:26+00:00",
      "updated_at": "2022-12-13T10:35:26+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:36:26+00:00",
      "updated_at": "2022-12-13T10:36:26+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:37:23+00:00",
      "updated_at": "2022-12-13T10:37:23+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:37:54+00:00",
      "updated_at": "2022-12-13T10:37:54+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-13T10:38:30+00:00",
      "updated_at": "2022-12-13T10:38:30+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:26:42+00:00",
      "updated_at": "2022-12-16T11:26:42+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:28:21+00:00",
      "updated_at": "2022-12-16T11:28:21+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:29:59+00:00",
      "updated_at": "2022-12-16T11:29:59+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:33:29+00:00",
      "updated_at": "2022-12-16T11:33:29+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:35:50+00:00",
      "updated_at": "2022-12-16T11:35:50+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:37:09+00:00",
      "updated_at": "2022-12-16T11:37:09+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:40:28+00:00",
      "updated_at": "2022-12-16T11:40:28+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:51:01+00:00",
      "updated_at": "2022-12-16T11:51:01+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:56:02+00:00",
      "updated_at": "2022-12-16T11:56:02+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f685c687dbcf7260472c367b68e38794c559e0018d714e29531df822d4f297c9",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1024.25",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1024.25_all.deb"
      },
      "created_at": "2022-12-16T11:57:13+00:00",
      "updated_at": "2022-12-16T11:57:13+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e41bbb4ccc0bae14d24aaa6d5a229c7ee98e5dea43cd34195b723f9277b8681e",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1025.26",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1025.26_all.deb"
      },
      "created_at": "2022-12-17T11:08:27+00:00",
      "updated_at": "2022-12-17T11:08:27+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-11-03T10:04:17+00:00",
  "updated_at": "2022-11-05T11:09:27+00:00",
  "deleted_at": null
}