ca6ba55413490e8ff4dd00f7679fbeaa2111a302db5bb8bd7781edfefd40e7d4
2fafa2094fe011a5530e3e07f172dd8942636e95
934532260e4aa8221f02e200fe672af0
5.17.0-1014.15
linux-image-unsigned-5.17.0-1014-oem_5.17.0-1014.15_amd64.deb
11320
DEB
linux-oem-5.17
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1014-oem
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33061 | 55 | USN | linux-oem-5.17-tools-host 5.17.0-1016.17 |
CVE-2022-2588 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1015.16 |
CVE-2022-2586 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1015.16 |
CVE-2021-33655 | 78 | USN | linux-oem-5.17-tools-host 5.17.0-1016.17 |
CVE-2022-2585 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1015.16 |
{ "sha256": "ca6ba55413490e8ff4dd00f7679fbeaa2111a302db5bb8bd7781edfefd40e7d4", "sha1": "2fafa2094fe011a5530e3e07f172dd8942636e95", "md5": "934532260e4aa8221f02e200fe672af0", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-5.17.0-1014-oem", "filename": "linux-image-unsigned-5.17.0-1014-oem_5.17.0-1014.15_amd64.deb", "size": 11320, "description": "Linux kernel image for version 5.17.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.17.0 on\n64 bit x86 SMP.\n\nSupports OEM processors.\n\nGeared toward desktops and laptops.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "5.17.0-1014.15", "source": "linux-oem-5.17", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.17.0-1014-oem", "applications": [], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a8c4f767a0c1c8247a4d01a7653f5d46619bce948b1a0e4047f760779fd5deb5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1016.17", "filename": "linux-oem-5.17-tools-host_5.17.0-1016.17_all.deb" }, "created_at": "2022-09-16T16:21:43+00:00", "updated_at": "2022-09-16T16:21:43+00:00" }, { "name": "CVE-2022-2588", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "671cbc93b872c9e6b899f92e776f15813348cbc1d7f25e42741a33762af25ff6", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1015.16", "filename": "linux-oem-5.17-tools-host_5.17.0-1015.16_all.deb" }, "created_at": "2022-09-16T16:30:43+00:00", "updated_at": "2022-09-16T16:30:43+00:00" }, { "name": "CVE-2022-2586", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "671cbc93b872c9e6b899f92e776f15813348cbc1d7f25e42741a33762af25ff6", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1015.16", "filename": "linux-oem-5.17-tools-host_5.17.0-1015.16_all.deb" }, "created_at": "2022-09-16T16:56:34+00:00", "updated_at": "2022-09-16T16:56:34+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "a8c4f767a0c1c8247a4d01a7653f5d46619bce948b1a0e4047f760779fd5deb5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1016.17", "filename": "linux-oem-5.17-tools-host_5.17.0-1016.17_all.deb" }, "created_at": "2022-09-16T16:58:32+00:00", "updated_at": "2022-09-16T16:58:32+00:00" }, { "name": "CVE-2022-2585", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "671cbc93b872c9e6b899f92e776f15813348cbc1d7f25e42741a33762af25ff6", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1015.16", "filename": "linux-oem-5.17-tools-host_5.17.0-1015.16_all.deb" }, "created_at": "2022-09-18T18:00:26+00:00", "updated_at": "2022-09-18T18:00:26+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-20T07:37:13+00:00", "updated_at": "2022-07-22T02:06:57+00:00", "deleted_at": null }