Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (33)

linux-intel-iotg-tools-5.15.0-1026

Hashes
Linux kernel version specific tools for version 5.15.0-1026 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.15.0-1026 on 64 bit x86. You probably want to install linux-tools-5.15.0-1026-<flavour>.
  • SHA256: 0abcc43019171d6d0ee96aa53e1b2824af6af2eb2a594ccb27b7edcea3c42f7f
  • SHA1: 018d505352e7f6295d7847fbe2049fe5093fb4ab
  • MD5: 3c85a74d2448c3561529445090f430c4
Information
  • Version: 5.15.0-1026.31
  • Filename: linux-intel-iotg-tools-5.15.0-1026_5.15.0-1026.31_amd64.deb
  • Size: 26073
  • Type: DEB
  • Source: linux-intel-iotg
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.15.0-1026
/usr/lib/libcpupower.so.5.15.0-1026
818000
usbip
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/usbip
2489680
libperf-jvmti.so
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/libperf-jvmti.so
2160160
turbostat
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/turbostat
1435440
cpupower
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/cpupower
2944400
perf
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/perf
223778640
acpidbg
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/acpidbg
9342880
bpftool
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/bpftool
15986880
usbipd
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/usbipd
2493680
x86_energy_perf_policy
/usr/lib/linux-intel-iotg-tools-5.15.0-1026/x86_energy_perf_policy
466160

Vulnerabilities

NameRiskSourceFixed
CVE-2023-235590USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-283280USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-266068USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-00450USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2022-21969USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2022-4121855USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2022-484248USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2022-3628055USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-234550USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-02108USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2022-34248USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2022-43826USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-234540USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2022-484238USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-02668USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-266068USN
CVE-2023-283280USN
CVE-2022-21969USN
CVE-2022-43826USN
CVE-2023-02668USN
CVE-2022-484238USN
CVE-2023-234550USN
CVE-2023-00450USN
CVE-2022-3628055USN
CVE-2022-34248USN
CVE-2022-4121855USN
CVE-2022-484248USN
CVE-2023-02108USN
CVE-2023-235590USN
CVE-2023-234540USN
CVE-2023-265448USN
linux-intel-iotg-tools-host
5.15.0-1027.32
CVE-2023-265448USN
CVE-2023-33570USN
linux-intel-iotg-tools-host
5.15.0-1027.32

Raw Object

{
  "sha256": "0abcc43019171d6d0ee96aa53e1b2824af6af2eb2a594ccb27b7edcea3c42f7f",
  "sha1": "018d505352e7f6295d7847fbe2049fe5093fb4ab",
  "md5": "3c85a74d2448c3561529445090f430c4",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-intel-iotg-tools-5.15.0-1026",
  "filename": "linux-intel-iotg-tools-5.15.0-1026_5.15.0-1026.31_amd64.deb",
  "size": 26073,
  "description": "Linux kernel version specific tools for version 5.15.0-1026\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1026 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1026-<flavour>.",
  "url": null,
  "version": "5.15.0-1026.31",
  "source": "linux-intel-iotg",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.15.0-1026",
      "sha256": "545ab394002f25ca9e5754e79d1710f08fb283630fcd3898dd700e76c96e3dd8",
      "sha1": "70791691c3e8280bffbd37c0cdc26b03d2eea5de",
      "md5": "c12ef5ce40e9dc0cff6c1e6570adf655",
      "name": "libcpupower.so.5.15.0-1026",
      "size": 81800,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/usbip",
      "sha256": "94b5a16f056f6ddd436c6f4a3d4c73715dcfa20e15be5a7c4ce7120eda1d4f8f",
      "sha1": "eb985d74672926e986ae417c4b0c3d781490e13d",
      "md5": "36247ce2dc15371b51c13a1798a7a05e",
      "name": "usbip",
      "size": 248968,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/libperf-jvmti.so",
      "sha256": "49aa07e44e5862fd8fceb59d60defc74fcebb5052e4544a7288c84da40075d0c",
      "sha1": "92aac9981c8fe6a93971def51a071f9792bb67b0",
      "md5": "635b71ab33640c41eb3910c49ad624d4",
      "name": "libperf-jvmti.so",
      "size": 216016,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/turbostat",
      "sha256": "11f39965019c0ad6d8e43a6ce02749543eb26cc68164f58ee797a89886d64d20",
      "sha1": "c810d09463f3c1cd49656662d11f98c6463644fa",
      "md5": "8f51926061fb7ebc823f4dec3fbf810d",
      "name": "turbostat",
      "size": 143544,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/cpupower",
      "sha256": "0c206ea48f1e343aa8caf2c04917bb6793036ffa38e41d16b17daace9ad417e9",
      "sha1": "77a4f0ec04eb09bd47cb97590489b45833af2479",
      "md5": "6f8fb1b9b629a55e60e9ca264796c474",
      "name": "cpupower",
      "size": 294440,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/perf",
      "sha256": "2aad54f89bc16412106b3642ae3e8bdd580a4e540db962419388757fef86b611",
      "sha1": "e46f5c92df1708ba08c99126fe031a47c33d5b40",
      "md5": "5928b3ba202f3bcf1ff08e7388da64ae",
      "name": "perf",
      "size": 22377864,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/acpidbg",
      "sha256": "d8a2d5784e0c9008100cf9b8524cf2dc6537100ee9223255d8fb48ed627b7b14",
      "sha1": "10eb77428bb34f3f50b9da46daadbc0b7d68410d",
      "md5": "45247a8026c56a534aab94710e880692",
      "name": "acpidbg",
      "size": 934288,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/bpftool",
      "sha256": "5bbfb92ca3e8579745eac1e42dc8e7bbc0e1930d1671a8aa114ffe59677e1b0b",
      "sha1": "3e9c11462c591cb2c71305134cc0fd21cec2ee54",
      "md5": "f94afd65b46aa346b0446c3224baf026",
      "name": "bpftool",
      "size": 1598688,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/usbipd",
      "sha256": "25b5160b1d2322bac1e0341c094ad99a3e25cb3c6168d15ddbfbfdcceed2e769",
      "sha1": "8af9938ded30b444ff15326f748e201242fe374b",
      "md5": "d6fec1dfaba42ccfc794349f163d310f",
      "name": "usbipd",
      "size": 249368,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1026/x86_energy_perf_policy",
      "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643",
      "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5",
      "md5": "e9d52e1dde799b718aef361de0e9b299",
      "name": "x86_energy_perf_policy",
      "size": 46616,
      "description": null,
      "package": 5151505,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-19T10:15:27+00:00",
      "updated_at": "2023-02-19T10:15:27+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2023-23559",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:34:15+00:00",
      "updated_at": "2023-04-12T09:34:15+00:00"
    },
    {
      "name": "CVE-2023-28328",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:34:57+00:00",
      "updated_at": "2023-04-12T09:34:57+00:00"
    },
    {
      "name": "CVE-2023-26606",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:35:38+00:00",
      "updated_at": "2023-04-12T09:35:38+00:00"
    },
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:35:51+00:00",
      "updated_at": "2023-04-12T09:35:51+00:00"
    },
    {
      "name": "CVE-2022-2196",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:36:17+00:00",
      "updated_at": "2023-04-12T09:36:17+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:36:51+00:00",
      "updated_at": "2023-04-12T09:36:51+00:00"
    },
    {
      "name": "CVE-2022-48424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:37:08+00:00",
      "updated_at": "2023-04-12T09:37:08+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:37:38+00:00",
      "updated_at": "2023-04-12T09:37:38+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:38:11+00:00",
      "updated_at": "2023-04-12T09:38:11+00:00"
    },
    {
      "name": "CVE-2023-0210",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:39:50+00:00",
      "updated_at": "2023-04-12T09:39:50+00:00"
    },
    {
      "name": "CVE-2022-3424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:42:56+00:00",
      "updated_at": "2023-04-12T09:42:56+00:00"
    },
    {
      "name": "CVE-2022-4382",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:44:58+00:00",
      "updated_at": "2023-04-12T09:44:58+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:45:24+00:00",
      "updated_at": "2023-04-12T09:45:24+00:00"
    },
    {
      "name": "CVE-2022-48423",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:46:59+00:00",
      "updated_at": "2023-04-12T09:46:59+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-12T09:47:11+00:00",
      "updated_at": "2023-04-12T09:47:11+00:00"
    },
    {
      "name": "CVE-2023-26606",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T09:45:03+00:00",
      "updated_at": "2023-04-13T09:45:03+00:00"
    },
    {
      "name": "CVE-2023-28328",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T09:48:00+00:00",
      "updated_at": "2023-04-13T09:48:00+00:00"
    },
    {
      "name": "CVE-2022-2196",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T09:48:57+00:00",
      "updated_at": "2023-04-13T09:48:57+00:00"
    },
    {
      "name": "CVE-2022-4382",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:05:10+00:00",
      "updated_at": "2023-04-13T10:05:10+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:05:25+00:00",
      "updated_at": "2023-04-13T10:05:25+00:00"
    },
    {
      "name": "CVE-2022-48423",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:09:58+00:00",
      "updated_at": "2023-04-13T10:09:58+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:12:07+00:00",
      "updated_at": "2023-04-13T10:12:07+00:00"
    },
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:13:47+00:00",
      "updated_at": "2023-04-13T10:13:47+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:16:06+00:00",
      "updated_at": "2023-04-13T10:16:06+00:00"
    },
    {
      "name": "CVE-2022-3424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:16:20+00:00",
      "updated_at": "2023-04-13T10:16:20+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:18:36+00:00",
      "updated_at": "2023-04-13T10:18:36+00:00"
    },
    {
      "name": "CVE-2022-48424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:28:28+00:00",
      "updated_at": "2023-04-13T10:28:28+00:00"
    },
    {
      "name": "CVE-2023-0210",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:28:33+00:00",
      "updated_at": "2023-04-13T10:28:33+00:00"
    },
    {
      "name": "CVE-2023-23559",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:29:15+00:00",
      "updated_at": "2023-04-13T10:29:15+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-13T10:31:01+00:00",
      "updated_at": "2023-04-13T10:31:01+00:00"
    },
    {
      "name": "CVE-2023-26544",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-04-21T09:36:21+00:00",
      "updated_at": "2023-04-21T09:36:21+00:00"
    },
    {
      "name": "CVE-2023-26544",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-18T09:44:27+00:00",
      "updated_at": "2023-05-18T09:44:27+00:00"
    },
    {
      "name": "CVE-2023-3357",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1027.32",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb"
      },
      "created_at": "2023-07-12T09:59:28+00:00",
      "updated_at": "2023-07-12T09:59:28+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2023-02-17T00:40:11+00:00",
  "updated_at": "2023-02-19T10:15:27+00:00",
  "deleted_at": null
}