2ae9841d4b293243331afd993e551b97b3129236c06ce61564ff3b401e44ffc0
18d5b34a82f3482a850c987ff45a352a114a7cc4
ee28ddb3820489f5200eeb50ad5072e1
5.4.0-131.147
linux-tools-host_5.4.0-131.147_all.deb
691
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
python3
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-39188 | 47 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-3635 | 7 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-29901 | 0 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-2978 | 78 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-2153 | 55 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-41222 | 47 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-42703 | 55 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-20422 | 70 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-3028 | 70 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-3625 | 8 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-42719 | 88 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-40768 | 55 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-3633 | 3 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2022-3629 | 3 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2023-1095 | 6 | USN | linux-tools-host 5.4.0-132.148 |
CVE-2023-2513 | 7 | USN | linux-tools-host 5.4.0-132.148 |
{ "sha256": "2ae9841d4b293243331afd993e551b97b3129236c06ce61564ff3b401e44ffc0", "sha1": "18d5b34a82f3482a850c987ff45a352a114a7cc4", "md5": "ee28ddb3820489f5200eeb50ad5072e1", "type": "DEB", "arch": "ALL", "name": "linux-tools-host", "filename": "linux-tools-host_5.4.0-131.147_all.deb", "size": 691, "description": "Linux kernel VM host tools\nThis package provides kernel tools useful for VM hosts.", "url": null, "version": "5.4.0-131.147", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "python3", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T10:37:01+00:00", "updated_at": "2022-11-17T10:37:01+00:00" }, { "name": "CVE-2022-3635", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T10:41:58+00:00", "updated_at": "2022-11-17T10:41:58+00:00" }, { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T10:48:45+00:00", "updated_at": "2022-11-17T10:48:45+00:00" }, { "name": "CVE-2022-2978", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:02:35+00:00", "updated_at": "2022-11-17T11:02:35+00:00" }, { "name": "CVE-2022-2153", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:03:05+00:00", "updated_at": "2022-11-17T11:03:05+00:00" }, { "name": "CVE-2022-41222", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:03:25+00:00", "updated_at": "2022-11-17T11:03:25+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:03:36+00:00", "updated_at": "2022-11-17T11:03:36+00:00" }, { "name": "CVE-2022-20422", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:03:53+00:00", "updated_at": "2022-11-17T11:03:53+00:00" }, { "name": "CVE-2022-3028", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:04:26+00:00", "updated_at": "2022-11-17T11:04:26+00:00" }, { "name": "CVE-2022-3625", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:07:47+00:00", "updated_at": "2022-11-17T11:07:47+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:08:07+00:00", "updated_at": "2022-11-17T11:08:07+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2022-11-17T11:08:55+00:00", "updated_at": "2022-11-17T11:08:55+00:00" }, { "name": "CVE-2022-3633", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2023-04-21T09:27:39+00:00", "updated_at": "2023-04-21T09:27:39+00:00" }, { "name": "CVE-2022-3629", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2023-04-21T09:28:20+00:00", "updated_at": "2023-04-21T09:28:20+00:00" }, { "name": "CVE-2023-1095", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2023-04-21T09:30:58+00:00", "updated_at": "2023-04-21T09:30:58+00:00" }, { "name": "CVE-2023-2513", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "348ca6115e9aa181c2742b3022102fbaad5a97ac27f2b72f8adc43c5dcd8d05c", "name": "linux-tools-host", "version": "5.4.0-132.148", "filename": "linux-tools-host_5.4.0-132.148_all.deb" }, "created_at": "2023-06-06T10:18:45+00:00", "updated_at": "2023-06-06T10:18:45+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-10-18T19:11:04+00:00", "updated_at": "2022-10-19T17:07:17+00:00", "deleted_at": null }