ddffccdad6c9bf0e24969fd3c70ae75f5e921efdffe3fec068d4fcec14153bf1
e0fbb791080d40943fe8ae4a329a41e7a61eb250
d9e30bf0aa04f09f58da55ab0c9db7c1
5.17.0-1024.25
linux-tools-5.17.0-1024-oem_5.17.0-1024.25_amd64.deb
330
DEB
linux-oem-5.17
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
linux-oem-5.17-tools-5.17.0-1024
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-42896 | 9 | USN | |
CVE-2022-42896 | 9 | USN | linux-oem-5.17-tools-host 5.17.0-1025.26 |
CVE-2023-0386 | 8 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2022-40307 | 47 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2023-1859 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2022-4095 | 8 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2023-23455 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2023-0468 | 5 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2022-3586 | 55 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2023-1829 | 8 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2022-3303 | 47 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2023-26545 | 8 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2022-4662 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2022-2590 | 70 | USN | linux-oem-5.17-tools-host 5.17.0-1031.32 |
CVE-2023-1859 | 0 | USN | |
CVE-2022-2590 | 70 | USN | |
CVE-2023-0468 | 5 | USN | |
CVE-2023-26545 | 8 | USN | |
CVE-2022-4095 | 8 | USN | |
CVE-2022-40307 | 47 | USN | |
CVE-2022-3303 | 47 | USN | |
CVE-2023-1829 | 8 | USN | |
CVE-2022-4662 | 0 | USN | |
CVE-2023-23455 | 0 | USN | |
CVE-2022-3586 | 55 | USN | |
CVE-2023-0386 | 8 | USN |
{ "sha256": "ddffccdad6c9bf0e24969fd3c70ae75f5e921efdffe3fec068d4fcec14153bf1", "sha1": "e0fbb791080d40943fe8ae4a329a41e7a61eb250", "md5": "d9e30bf0aa04f09f58da55ab0c9db7c1", "type": "DEB", "arch": "AMD64", "name": "linux-tools-5.17.0-1024-oem", "filename": "linux-tools-5.17.0-1024-oem_5.17.0-1024.25_amd64.deb", "size": 330, "description": "Linux kernel version specific tools for version 5.17.0-1024\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.17.0-1024 on\n64 bit x86.", "url": null, "version": "5.17.0-1024.25", "source": "linux-oem-5.17", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-oem-5.17-tools-5.17.0-1024", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-12-19T10:04:11+00:00", "updated_at": "2022-12-19T10:04:11+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "e41bbb4ccc0bae14d24aaa6d5a229c7ee98e5dea43cd34195b723f9277b8681e", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1025.26", "filename": "linux-oem-5.17-tools-host_5.17.0-1025.26_all.deb" }, "created_at": "2022-12-17T11:08:27+00:00", "updated_at": "2022-12-17T11:08:27+00:00" }, { "name": "CVE-2023-0386", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:17:19+00:00", "updated_at": "2023-05-11T10:17:19+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:18:28+00:00", "updated_at": "2023-05-11T10:18:28+00:00" }, { "name": "CVE-2023-1859", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:29:43+00:00", "updated_at": "2023-05-11T10:29:43+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:30:03+00:00", "updated_at": "2023-05-11T10:30:03+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:35:18+00:00", "updated_at": "2023-05-11T10:35:18+00:00" }, { "name": "CVE-2023-0468", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:36:30+00:00", "updated_at": "2023-05-11T10:36:30+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:47:24+00:00", "updated_at": "2023-05-11T10:47:24+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T10:59:28+00:00", "updated_at": "2023-05-11T10:59:28+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T11:11:04+00:00", "updated_at": "2023-05-11T11:11:04+00:00" }, { "name": "CVE-2023-26545", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T11:11:37+00:00", "updated_at": "2023-05-11T11:11:37+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T11:15:20+00:00", "updated_at": "2023-05-11T11:15:20+00:00" }, { "name": "CVE-2022-2590", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1031.32", "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb" }, "created_at": "2023-05-11T11:26:53+00:00", "updated_at": "2023-05-11T11:26:53+00:00" }, { "name": "CVE-2023-1859", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T10:50:31+00:00", "updated_at": "2023-05-13T10:50:31+00:00" }, { "name": "CVE-2022-2590", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T11:03:23+00:00", "updated_at": "2023-05-13T11:03:23+00:00" }, { "name": "CVE-2023-0468", "risk": 5, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T11:38:27+00:00", "updated_at": "2023-05-13T11:38:27+00:00" }, { "name": "CVE-2023-26545", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T11:39:57+00:00", "updated_at": "2023-05-13T11:39:57+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T12:03:13+00:00", "updated_at": "2023-05-13T12:03:13+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T12:33:35+00:00", "updated_at": "2023-05-13T12:33:35+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T12:56:08+00:00", "updated_at": "2023-05-13T12:56:08+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T13:17:35+00:00", "updated_at": "2023-05-13T13:17:35+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T13:25:09+00:00", "updated_at": "2023-05-13T13:25:09+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T13:38:22+00:00", "updated_at": "2023-05-13T13:38:22+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T13:41:15+00:00", "updated_at": "2023-05-13T13:41:15+00:00" }, { "name": "CVE-2023-0386", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-05-13T13:42:40+00:00", "updated_at": "2023-05-13T13:42:40+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-11-28T21:50:27+00:00", "updated_at": "2022-12-10T10:35:39+00:00", "deleted_at": null }