Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (26)

linux-tools-5.17.0-1024-oem

Hashes
Linux kernel version specific tools for version 5.17.0-1024 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.17.0-1024 on 64 bit x86.
  • SHA256: ddffccdad6c9bf0e24969fd3c70ae75f5e921efdffe3fec068d4fcec14153bf1
  • SHA1: e0fbb791080d40943fe8ae4a329a41e7a61eb250
  • MD5: d9e30bf0aa04f09f58da55ab0c9db7c1
Information
  • Version: 5.17.0-1024.25
  • Filename: linux-tools-5.17.0-1024-oem_5.17.0-1024.25_amd64.deb
  • Size: 330
  • Type: DEB
  • Source: linux-oem-5.17
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: linux-oem-5.17-tools-5.17.0-1024

Vulnerabilities

NameRiskSourceFixed
CVE-2022-428969USN
CVE-2022-428969USN
linux-oem-5.17-tools-host
5.17.0-1025.26
CVE-2023-03868USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2022-4030747USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2023-18590USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2022-40958USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2023-234550USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2023-04685USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2022-358655USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2023-18298USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2022-330347USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2023-265458USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2022-46620USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2022-259070USN
linux-oem-5.17-tools-host
5.17.0-1031.32
CVE-2023-18590USN
CVE-2022-259070USN
CVE-2023-04685USN
CVE-2023-265458USN
CVE-2022-40958USN
CVE-2022-4030747USN
CVE-2022-330347USN
CVE-2023-18298USN
CVE-2022-46620USN
CVE-2023-234550USN
CVE-2022-358655USN
CVE-2023-03868USN

Raw Object

{
  "sha256": "ddffccdad6c9bf0e24969fd3c70ae75f5e921efdffe3fec068d4fcec14153bf1",
  "sha1": "e0fbb791080d40943fe8ae4a329a41e7a61eb250",
  "md5": "d9e30bf0aa04f09f58da55ab0c9db7c1",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-tools-5.17.0-1024-oem",
  "filename": "linux-tools-5.17.0-1024-oem_5.17.0-1024.25_amd64.deb",
  "size": 330,
  "description": "Linux kernel version specific tools for version 5.17.0-1024\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.17.0-1024 on\n64 bit x86.",
  "url": null,
  "version": "5.17.0-1024.25",
  "source": "linux-oem-5.17",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "linux-oem-5.17-tools-5.17.0-1024",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-12-19T10:04:11+00:00",
      "updated_at": "2022-12-19T10:04:11+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e41bbb4ccc0bae14d24aaa6d5a229c7ee98e5dea43cd34195b723f9277b8681e",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1025.26",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1025.26_all.deb"
      },
      "created_at": "2022-12-17T11:08:27+00:00",
      "updated_at": "2022-12-17T11:08:27+00:00"
    },
    {
      "name": "CVE-2023-0386",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:17:19+00:00",
      "updated_at": "2023-05-11T10:17:19+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:18:28+00:00",
      "updated_at": "2023-05-11T10:18:28+00:00"
    },
    {
      "name": "CVE-2023-1859",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:29:43+00:00",
      "updated_at": "2023-05-11T10:29:43+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:30:03+00:00",
      "updated_at": "2023-05-11T10:30:03+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:35:18+00:00",
      "updated_at": "2023-05-11T10:35:18+00:00"
    },
    {
      "name": "CVE-2023-0468",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:36:30+00:00",
      "updated_at": "2023-05-11T10:36:30+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:47:24+00:00",
      "updated_at": "2023-05-11T10:47:24+00:00"
    },
    {
      "name": "CVE-2023-1829",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T10:59:28+00:00",
      "updated_at": "2023-05-11T10:59:28+00:00"
    },
    {
      "name": "CVE-2022-3303",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T11:11:04+00:00",
      "updated_at": "2023-05-11T11:11:04+00:00"
    },
    {
      "name": "CVE-2023-26545",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T11:11:37+00:00",
      "updated_at": "2023-05-11T11:11:37+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T11:15:20+00:00",
      "updated_at": "2023-05-11T11:15:20+00:00"
    },
    {
      "name": "CVE-2022-2590",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "93a07bc73cabc412641b2d898c964d228b2b4b7cf20ab1b96db668ede9ae8cf5",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1031.32",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1031.32_all.deb"
      },
      "created_at": "2023-05-11T11:26:53+00:00",
      "updated_at": "2023-05-11T11:26:53+00:00"
    },
    {
      "name": "CVE-2023-1859",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T10:50:31+00:00",
      "updated_at": "2023-05-13T10:50:31+00:00"
    },
    {
      "name": "CVE-2022-2590",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T11:03:23+00:00",
      "updated_at": "2023-05-13T11:03:23+00:00"
    },
    {
      "name": "CVE-2023-0468",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T11:38:27+00:00",
      "updated_at": "2023-05-13T11:38:27+00:00"
    },
    {
      "name": "CVE-2023-26545",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T11:39:57+00:00",
      "updated_at": "2023-05-13T11:39:57+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T12:03:13+00:00",
      "updated_at": "2023-05-13T12:03:13+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T12:33:35+00:00",
      "updated_at": "2023-05-13T12:33:35+00:00"
    },
    {
      "name": "CVE-2022-3303",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T12:56:08+00:00",
      "updated_at": "2023-05-13T12:56:08+00:00"
    },
    {
      "name": "CVE-2023-1829",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T13:17:35+00:00",
      "updated_at": "2023-05-13T13:17:35+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T13:25:09+00:00",
      "updated_at": "2023-05-13T13:25:09+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T13:38:22+00:00",
      "updated_at": "2023-05-13T13:38:22+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T13:41:15+00:00",
      "updated_at": "2023-05-13T13:41:15+00:00"
    },
    {
      "name": "CVE-2023-0386",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T13:42:40+00:00",
      "updated_at": "2023-05-13T13:42:40+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-11-28T21:50:27+00:00",
  "updated_at": "2022-12-10T10:35:39+00:00",
  "deleted_at": null
}