Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (74)

linux-intel-iotg-tools-5.15.0-1011

Hashes
Linux kernel version specific tools for version 5.15.0-1011 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.15.0-1011 on 64 bit x86. You probably want to install linux-tools-5.15.0-1011-<flavour>.
  • SHA256: 3f98aa666b3cf053f2d70ea0994f71bc341f865afb0077d36711797356b09f76
  • SHA1: cacf9fb95b3a0e848bd420a1387f006681b60420
  • MD5: 1058766822603dd0b89692cf3afdc33e
Information
  • Version: 5.15.0-1011.15
  • Filename: linux-intel-iotg-tools-5.15.0-1011_5.15.0-1011.15_amd64.deb
  • Size: 25911
  • Type: DEB
  • Source: linux-intel-iotg
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.15.0-1011
/usr/lib/libcpupower.so.5.15.0-1011
817920
usbip
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/usbip
2489600
libperf-jvmti.so
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/libperf-jvmti.so
2159200
turbostat
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/turbostat
1435360
cpupower
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/cpupower
2944320
perf
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/perf
223668000
acpidbg
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/acpidbg
9342800
bpftool
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/bpftool
15929440
usbipd
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/usbipd
2493600
x86_energy_perf_policy
/usr/lib/linux-intel-iotg-tools-5.15.0-1011/x86_energy_perf_policy
466080

Vulnerabilities

NameRiskSourceFixed
CVE-2022-25880USN
CVE-2022-17890USN
CVE-2022-05000USN
CVE-2022-25860USN
CVE-2022-197555USN
CVE-2022-349180USN
CVE-2022-2889378USN
CVE-2022-17340USN
CVE-2022-165278USN
CVE-2022-197441USN
CVE-2022-16790USN
CVE-2022-339810USN
CVE-2022-18520USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-25860USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-287355USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-172970USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-25880USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-349180USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-197371USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-197555USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-19430USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-250367USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-295970USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-17890USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-101291USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-2889378USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2021-3306155USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-165278USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-17340USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-339810USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-197441USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-16790USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-322960USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-05000USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-299010USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-25850USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-299000USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-322960USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-19430USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-101291USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-25850USN
CVE-2022-101291USN
CVE-2022-250367USN
CVE-2022-18520USN
CVE-2022-322960USN
CVE-2022-299010USN
CVE-2022-295970USN
CVE-2022-287355USN
CVE-2022-19430USN
CVE-2022-197371USN
CVE-2022-172970USN
CVE-2021-3306155USN
CVE-2022-299000USN
CVE-2022-263978USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2022-357778USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-307755USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-205727USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-31156USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-205727USN
CVE-2023-18387USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2022-197441USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2023-18387USN
CVE-2022-263978USN
CVE-2022-31156USN
CVE-2022-357778USN
CVE-2022-307755USN
CVE-2023-31590USN
linux-intel-iotg-tools-host
5.15.0-1013.17
CVE-2023-43877USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2023-44596USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2023-43856USN
linux-intel-iotg-tools-host
5.15.0-1015.20
CVE-2023-43856USN
CVE-2023-43877USN
CVE-2023-31590USN
CVE-2023-44596USN

Raw Object

{
  "sha256": "3f98aa666b3cf053f2d70ea0994f71bc341f865afb0077d36711797356b09f76",
  "sha1": "cacf9fb95b3a0e848bd420a1387f006681b60420",
  "md5": "1058766822603dd0b89692cf3afdc33e",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-intel-iotg-tools-5.15.0-1011",
  "filename": "linux-intel-iotg-tools-5.15.0-1011_5.15.0-1011.15_amd64.deb",
  "size": 25911,
  "description": "Linux kernel version specific tools for version 5.15.0-1011\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1011 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1011-<flavour>.",
  "url": null,
  "version": "5.15.0-1011.15",
  "source": "linux-intel-iotg",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.15.0-1011",
      "sha256": "504f194faba7460b0bb96a5f2bac0fbf97cbe35c4e29b094d9504bf401112f74",
      "sha1": "4cdbb4623736b1fc07638ea2fcc931d634943428",
      "md5": "ada43059526e1667ba720924c8801f13",
      "name": "libcpupower.so.5.15.0-1011",
      "size": 81792,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:01+00:00",
      "updated_at": "2022-07-07T02:57:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/usbip",
      "sha256": "2292bc8bc0e5f981c49376b3ff92656c47623da57f81e57eaa3b41d4fa6b7f2e",
      "sha1": "62922dc54f1727d67b8a607e90e5518a15321ad8",
      "md5": "5e10e398c9d5350dd2d4f158130b79fc",
      "name": "usbip",
      "size": 248960,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:01+00:00",
      "updated_at": "2022-07-07T02:57:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/libperf-jvmti.so",
      "sha256": "34ef16069e4ea1dbf101be4a6ce3a0c5c33807508d01ba3008c5313f78e957f7",
      "sha1": "5ed0e0a7e3b3c3b62ce3e6d9fd86f2b7962c6b7c",
      "md5": "2ecd5bd68a1483dbe18eefaf9050edb9",
      "name": "libperf-jvmti.so",
      "size": 215920,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:01+00:00",
      "updated_at": "2022-07-07T02:57:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/turbostat",
      "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206",
      "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b",
      "md5": "74e235bf371ac5db13aeeacee0cc7acd",
      "name": "turbostat",
      "size": 143536,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:01+00:00",
      "updated_at": "2022-07-07T02:57:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/cpupower",
      "sha256": "c25a38b56f70eaff2f646e5566f2beb7e5e33b26aced853a9a4cac9dc98af6fc",
      "sha1": "ef6436f12c006e3cb0bd145f6def43c9060a5fe7",
      "md5": "8321995e257913ea03a9cc3f7f29fab7",
      "name": "cpupower",
      "size": 294432,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:01+00:00",
      "updated_at": "2022-07-07T02:57:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/perf",
      "sha256": "b4b429161d16412c226e46accac0eb32a0248dd47e8814885e39aa942442d672",
      "sha1": "8af3bf44e9143418ee2666752ad9ef0ff1314a8a",
      "md5": "d6be3115eb43bbd19ee5813da1e84be0",
      "name": "perf",
      "size": 22366800,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:02+00:00",
      "updated_at": "2022-07-07T02:57:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/acpidbg",
      "sha256": "d6dc01ab9ec2d5fd5d8b911a4e7248d96d113ba35312ed3a5a27cbf25ccbc57c",
      "sha1": "d14f0e571ba30b8ec619a39779a65a3ceff6d65b",
      "md5": "319c3cd666f981b1fbc580ed54470d9c",
      "name": "acpidbg",
      "size": 934280,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:02+00:00",
      "updated_at": "2022-07-07T02:57:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/bpftool",
      "sha256": "c71889805e0fc292c13094b62d18ac09476d5078998fe983272bed6e6238f066",
      "sha1": "391ffc88d4b2c7c66c10408a860bb14028243195",
      "md5": "4537a373faca6d8f7f74976df8be8f02",
      "name": "bpftool",
      "size": 1592944,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:02+00:00",
      "updated_at": "2022-07-07T02:57:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/usbipd",
      "sha256": "0b3d45d6f89b5b91969ab79509bb218271a9ad6515cac3643fc2af8bfc13ce1e",
      "sha1": "4c61f766d3e892b6bf449b59b59fa686590d21dd",
      "md5": "857f9b6473d47c2eb8a6c4e508d2e8f0",
      "name": "usbipd",
      "size": 249360,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:02+00:00",
      "updated_at": "2022-07-07T02:57:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-intel-iotg-tools-5.15.0-1011/x86_energy_perf_policy",
      "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543",
      "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b",
      "md5": "b22454323232ae918c7ea0cc55df6557",
      "name": "x86_energy_perf_policy",
      "size": 46608,
      "description": null,
      "package": 3829043,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-07T02:57:02+00:00",
      "updated_at": "2022-07-07T02:57:02+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:27:17+00:00",
      "updated_at": "2022-09-16T16:27:17+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:37:47+00:00",
      "updated_at": "2022-09-16T16:37:47+00:00"
    },
    {
      "name": "CVE-2022-0500",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:56:01+00:00",
      "updated_at": "2022-09-16T16:56:01+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:56:30+00:00",
      "updated_at": "2022-09-16T16:56:30+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:57:07+00:00",
      "updated_at": "2022-09-16T16:57:07+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:57:53+00:00",
      "updated_at": "2022-09-16T16:57:53+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:07:27+00:00",
      "updated_at": "2022-09-16T17:07:27+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:11:50+00:00",
      "updated_at": "2022-09-16T17:11:50+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:14:13+00:00",
      "updated_at": "2022-09-16T17:14:13+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:16:25+00:00",
      "updated_at": "2022-09-16T17:16:25+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:20:43+00:00",
      "updated_at": "2022-09-16T17:20:43+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:21:07+00:00",
      "updated_at": "2022-09-16T17:21:07+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:24:17+00:00",
      "updated_at": "2022-09-16T21:24:17+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:29:31+00:00",
      "updated_at": "2022-09-16T21:29:31+00:00"
    },
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:30:33+00:00",
      "updated_at": "2022-09-16T21:30:33+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:30:57+00:00",
      "updated_at": "2022-09-16T21:30:57+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:31:31+00:00",
      "updated_at": "2022-09-16T21:31:31+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:38:56+00:00",
      "updated_at": "2022-09-16T21:38:56+00:00"
    },
    {
      "name": "CVE-2022-1973",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:40:21+00:00",
      "updated_at": "2022-09-16T21:40:21+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:40:59+00:00",
      "updated_at": "2022-09-16T21:40:59+00:00"
    },
    {
      "name": "CVE-2022-1943",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:41:50+00:00",
      "updated_at": "2022-09-16T21:41:50+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:42:01+00:00",
      "updated_at": "2022-09-16T21:42:01+00:00"
    },
    {
      "name": "CVE-2022-2959",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:42:19+00:00",
      "updated_at": "2022-09-16T21:42:19+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:43:17+00:00",
      "updated_at": "2022-09-16T21:43:17+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:48:10+00:00",
      "updated_at": "2022-09-16T21:48:10+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:48:29+00:00",
      "updated_at": "2022-09-16T21:48:29+00:00"
    },
    {
      "name": "CVE-2021-33061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:48:46+00:00",
      "updated_at": "2022-09-16T21:48:46+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:49:33+00:00",
      "updated_at": "2022-09-16T21:49:33+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:50:06+00:00",
      "updated_at": "2022-09-16T21:50:06+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:51:19+00:00",
      "updated_at": "2022-09-16T21:51:19+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:52:54+00:00",
      "updated_at": "2022-09-16T21:52:54+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:53:26+00:00",
      "updated_at": "2022-09-16T21:53:26+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2022-09-16T21:53:58+00:00",
      "updated_at": "2022-09-16T21:53:58+00:00"
    },
    {
      "name": "CVE-2022-0500",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-16T21:54:40+00:00",
      "updated_at": "2022-09-16T21:54:40+00:00"
    },
    {
      "name": "CVE-2022-29901",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-18T13:37:54+00:00",
      "updated_at": "2022-09-18T13:37:54+00:00"
    },
    {
      "name": "CVE-2022-2585",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-18T18:00:24+00:00",
      "updated_at": "2022-09-18T18:00:24+00:00"
    },
    {
      "name": "CVE-2022-29900",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-09-19T11:13:47+00:00",
      "updated_at": "2022-09-19T11:13:47+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-10-08T16:38:14+00:00",
      "updated_at": "2022-10-08T16:38:14+00:00"
    },
    {
      "name": "CVE-2022-1943",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-10-08T16:41:31+00:00",
      "updated_at": "2022-10-08T16:41:31+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2022-10-08T16:50:20+00:00",
      "updated_at": "2022-10-08T16:50:20+00:00"
    },
    {
      "name": "CVE-2022-2585",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T11:36:02+00:00",
      "updated_at": "2022-11-11T11:36:02+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T11:36:27+00:00",
      "updated_at": "2022-11-11T11:36:27+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T11:39:19+00:00",
      "updated_at": "2022-11-11T11:39:19+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T11:45:49+00:00",
      "updated_at": "2022-11-11T11:45:49+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T11:47:36+00:00",
      "updated_at": "2022-11-11T11:47:36+00:00"
    },
    {
      "name": "CVE-2022-29901",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T11:49:09+00:00",
      "updated_at": "2022-11-11T11:49:09+00:00"
    },
    {
      "name": "CVE-2022-2959",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T12:11:43+00:00",
      "updated_at": "2022-11-11T12:11:43+00:00"
    },
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T12:12:30+00:00",
      "updated_at": "2022-11-11T12:12:30+00:00"
    },
    {
      "name": "CVE-2022-1943",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T12:22:38+00:00",
      "updated_at": "2022-11-11T12:22:38+00:00"
    },
    {
      "name": "CVE-2022-1973",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T12:28:53+00:00",
      "updated_at": "2022-11-11T12:28:53+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T12:45:55+00:00",
      "updated_at": "2022-11-11T12:45:55+00:00"
    },
    {
      "name": "CVE-2021-33061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T12:53:21+00:00",
      "updated_at": "2022-11-11T12:53:21+00:00"
    },
    {
      "name": "CVE-2022-29900",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-11-11T13:05:23+00:00",
      "updated_at": "2022-11-11T13:05:23+00:00"
    },
    {
      "name": "CVE-2022-2639",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2023-02-18T11:25:00+00:00",
      "updated_at": "2023-02-18T11:25:00+00:00"
    },
    {
      "name": "CVE-2022-3577",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-02-18T11:25:29+00:00",
      "updated_at": "2023-02-18T11:25:29+00:00"
    },
    {
      "name": "CVE-2022-3077",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-02-18T12:10:37+00:00",
      "updated_at": "2023-02-18T12:10:37+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-03-07T11:46:34+00:00",
      "updated_at": "2023-03-07T11:46:34+00:00"
    },
    {
      "name": "CVE-2022-3115",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-03-07T12:09:25+00:00",
      "updated_at": "2023-03-07T12:09:25+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-26T23:30:38+00:00",
      "updated_at": "2023-04-26T23:30:38+00:00"
    },
    {
      "name": "CVE-2023-1838",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-04-21T09:27:18+00:00",
      "updated_at": "2023-04-21T09:27:18+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-04-21T09:33:11+00:00",
      "updated_at": "2023-04-21T09:33:11+00:00"
    },
    {
      "name": "CVE-2023-1838",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-27T00:19:23+00:00",
      "updated_at": "2023-04-27T00:19:23+00:00"
    },
    {
      "name": "CVE-2022-2639",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-27T08:24:54+00:00",
      "updated_at": "2023-04-27T08:24:54+00:00"
    },
    {
      "name": "CVE-2022-3115",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-27T10:37:39+00:00",
      "updated_at": "2023-04-27T10:37:39+00:00"
    },
    {
      "name": "CVE-2022-3577",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-27T12:49:38+00:00",
      "updated_at": "2023-04-27T12:49:38+00:00"
    },
    {
      "name": "CVE-2022-3077",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-27T21:32:52+00:00",
      "updated_at": "2023-04-27T21:32:52+00:00"
    },
    {
      "name": "CVE-2023-3159",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9be49aa1f3a205b59cbfe476680325b9a902874a69d6ae1c7614aa52a59db95",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1013.17",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1013.17_all.deb"
      },
      "created_at": "2023-07-12T10:06:20+00:00",
      "updated_at": "2023-07-12T10:06:20+00:00"
    },
    {
      "name": "CVE-2023-4387",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-09-13T09:51:06+00:00",
      "updated_at": "2023-09-13T09:51:06+00:00"
    },
    {
      "name": "CVE-2023-4459",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-09-13T10:29:11+00:00",
      "updated_at": "2023-09-13T10:29:11+00:00"
    },
    {
      "name": "CVE-2023-4385",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1015.20",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
      },
      "created_at": "2023-09-13T10:59:51+00:00",
      "updated_at": "2023-09-13T10:59:51+00:00"
    },
    {
      "name": "CVE-2023-4385",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-15T10:45:27+00:00",
      "updated_at": "2023-09-15T10:45:27+00:00"
    },
    {
      "name": "CVE-2023-4387",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-15T11:09:26+00:00",
      "updated_at": "2023-09-15T11:09:26+00:00"
    },
    {
      "name": "CVE-2023-3159",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-15T11:11:31+00:00",
      "updated_at": "2023-09-15T11:11:31+00:00"
    },
    {
      "name": "CVE-2023-4459",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-15T11:16:25+00:00",
      "updated_at": "2023-09-15T11:16:25+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-07-06T09:54:11+00:00",
  "updated_at": "2022-07-07T01:57:01+00:00",
  "deleted_at": null
}