473148e0619c3013e4d379e503795c7c54de82605cef864338642ba6c235b9e8
49aea4935126d8398850e79bb45d5b2b61243119
960f35116b8ea2b0d5bde438b06377a1
5.4.0-126.142
linux-tools-host_5.4.0-126.142_all.deb
684
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
python3
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-33741 | 0 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-33742 | 0 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-36879 | 55 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-33744 | 0 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2021-4159 | 44 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-26365 | 0 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-26373 | 55 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-20369 | 67 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-33740 | 0 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-2318 | 0 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-3176 | 78 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-20566 | 8 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-1462 | 63 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2022-21505 | 0 | USN | linux-tools-host 5.4.0-128.144 |
CVE-2023-2177 | 6 | USN | linux-tools-host 5.4.0-128.144 |
{ "sha256": "473148e0619c3013e4d379e503795c7c54de82605cef864338642ba6c235b9e8", "sha1": "49aea4935126d8398850e79bb45d5b2b61243119", "md5": "960f35116b8ea2b0d5bde438b06377a1", "type": "DEB", "arch": "ALL", "name": "linux-tools-host", "filename": "linux-tools-host_5.4.0-126.142_all.deb", "size": 684, "description": "Linux kernel VM host tools\nThis package provides kernel tools useful for VM hosts.", "url": null, "version": "5.4.0-126.142", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "python3", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-33741", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:26:50+00:00", "updated_at": "2022-10-11T17:26:50+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:31:12+00:00", "updated_at": "2022-10-11T17:31:12+00:00" }, { "name": "CVE-2022-36879", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:31:22+00:00", "updated_at": "2022-10-11T17:31:22+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:36:53+00:00", "updated_at": "2022-10-11T17:36:53+00:00" }, { "name": "CVE-2021-4159", "risk": 44, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:37:01+00:00", "updated_at": "2022-10-11T17:37:01+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:37:08+00:00", "updated_at": "2022-10-11T17:37:08+00:00" }, { "name": "CVE-2022-26373", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:37:17+00:00", "updated_at": "2022-10-11T17:37:17+00:00" }, { "name": "CVE-2022-20369", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:37:39+00:00", "updated_at": "2022-10-11T17:37:39+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:37:56+00:00", "updated_at": "2022-10-11T17:37:56+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:38:09+00:00", "updated_at": "2022-10-11T17:38:09+00:00" }, { "name": "CVE-2022-3176", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2022-10-11T17:38:18+00:00", "updated_at": "2022-10-11T17:38:18+00:00" }, { "name": "CVE-2022-20566", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2023-01-29T16:54:43+00:00", "updated_at": "2023-01-29T16:54:43+00:00" }, { "name": "CVE-2022-1462", "risk": 63, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2023-03-07T12:11:18+00:00", "updated_at": "2023-03-07T12:11:18+00:00" }, { "name": "CVE-2022-21505", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2023-04-21T09:38:11+00:00", "updated_at": "2023-04-21T09:38:11+00:00" }, { "name": "CVE-2023-2177", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393", "name": "linux-tools-host", "version": "5.4.0-128.144", "filename": "linux-tools-host_5.4.0-128.144_all.deb" }, "created_at": "2023-06-06T09:35:11+00:00", "updated_at": "2023-06-06T09:35:11+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-08-30T11:18:33+00:00", "updated_at": "2022-08-31T02:17:32+00:00", "deleted_at": null }