5d76752b29594848e8744f45e1bca59599d0ed319edd59bf205869436cbec266
6f9808907f0715b884e6d7a2c57a163932b55b15
68f2024b891b8acfc9993f141a7beeb3
5.15.0-54.60
linux-cloud-tools-5.15.0-54_5.15.0-54.60_amd64.deb
521
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), linux-cloud-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
hv_fcopy_daemon /usr/lib/linux-tools-5.15.0-54/hv_fcopy_daemon | 17232 | 0 | ||
hv_kvp_daemon /usr/lib/linux-tools-5.15.0-54/hv_kvp_daemon | 40448 | 0 | ||
hv_vss_daemon /usr/lib/linux-tools-5.15.0-54/hv_vss_daemon | 21952 | 0 |
{ "sha256": "5d76752b29594848e8744f45e1bca59599d0ed319edd59bf205869436cbec266", "sha1": "6f9808907f0715b884e6d7a2c57a163932b55b15", "md5": "68f2024b891b8acfc9993f141a7beeb3", "type": "DEB", "arch": "AMD64", "name": "linux-cloud-tools-5.15.0-54", "filename": "linux-cloud-tools-5.15.0-54_5.15.0-54.60_amd64.deb", "size": 521, "description": "Linux kernel version specific cloud tools for version 5.15.0-54\nThis package provides the architecture dependant parts for kernel\nversion locked tools for cloud tools for version 5.15.0-54 on\n64 bit x86.\nYou probably want to install linux-cloud-tools-5.15.0-54-<flavour>.", "url": null, "version": "5.15.0-54.60", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), linux-cloud-tools-common", "applications": [ { "path": "/usr/lib/linux-tools-5.15.0-54/hv_fcopy_daemon", "sha256": "4a5941401f55f9b3113fe467b82981900eaefc3b926fcc16873d6f625583b0e3", "sha1": "1b9e6f720f4d779601c4ef58979e6e4ccbb839cf", "md5": "ed37df0c08ee5eb03930511e632cda1f", "name": "hv_fcopy_daemon", "size": 17232, "description": null, "package": 4907207, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:20:15+00:00", "updated_at": "2022-11-17T10:20:15+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/hv_kvp_daemon", "sha256": "69c7cf012371e0cbea5dc85194e2f842e3cfc5c02e7bf5727bd6d8ff679dcd5f", "sha1": "6bde5e301b97e3f8587489a73d1c254c3e303c7b", "md5": "78945c5153c6cb4d8704ccc1ece55381", "name": "hv_kvp_daemon", "size": 40448, "description": null, "package": 4907207, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:20:15+00:00", "updated_at": "2022-11-17T10:20:15+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/hv_vss_daemon", "sha256": "38a28c7a9a947c4e09897862ce841f10be7dc3940d3278a1cdc73c5d118525f8", "sha1": "4e8be5bcc6d318cde6ab3dbc1fb790b7e8c5e272", "md5": "2b59c769a78cc673c72d11549155be16", "name": "hv_vss_daemon", "size": 21952, "description": null, "package": 4907207, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:20:15+00:00", "updated_at": "2022-11-17T10:20:15+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:27:36+00:00", "updated_at": "2022-12-02T12:27:36+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:37:57+00:00", "updated_at": "2022-12-02T12:37:57+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:39:48+00:00", "updated_at": "2022-12-02T12:39:48+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:41:43+00:00", "updated_at": "2022-12-02T12:41:43+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:42:29+00:00", "updated_at": "2022-12-02T12:42:29+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:43:17+00:00", "updated_at": "2022-12-02T12:43:17+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:44:21+00:00", "updated_at": "2022-12-02T12:44:21+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:45:47+00:00", "updated_at": "2022-12-02T12:45:47+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84", "name": "linux-tools-host", "version": "5.15.0-56.62", "filename": "linux-tools-host_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:46:26+00:00", "updated_at": "2022-12-02T12:46:26+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:39:04+00:00", "updated_at": "2022-12-03T12:39:04+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:41:06+00:00", "updated_at": "2022-12-03T12:41:06+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:41:44+00:00", "updated_at": "2022-12-03T12:41:44+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:42:49+00:00", "updated_at": "2022-12-03T12:42:49+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:43:25+00:00", "updated_at": "2022-12-03T12:43:25+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:44:22+00:00", "updated_at": "2022-12-03T12:44:22+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:44:40+00:00", "updated_at": "2022-12-03T12:44:40+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:45:04+00:00", "updated_at": "2022-12-03T12:45:04+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:45:43+00:00", "updated_at": "2022-12-03T12:45:43+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T10:46:01+00:00", "updated_at": "2022-12-12T10:46:01+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T10:51:10+00:00", "updated_at": "2022-12-12T10:51:10+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T11:05:25+00:00", "updated_at": "2022-12-12T11:05:25+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T11:22:35+00:00", "updated_at": "2022-12-12T11:22:35+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T11:49:43+00:00", "updated_at": "2022-12-12T11:49:43+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T12:10:30+00:00", "updated_at": "2022-12-12T12:10:30+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T12:15:46+00:00", "updated_at": "2022-12-12T12:15:46+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T12:17:29+00:00", "updated_at": "2022-12-12T12:17:29+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-12T12:23:09+00:00", "updated_at": "2022-12-12T12:23:09+00:00" }, { "name": "CVE-2022-3649", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T11:41:21+00:00", "updated_at": "2023-01-07T11:41:21+00:00" }, { "name": "CVE-2022-0171", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T11:55:31+00:00", "updated_at": "2023-01-07T11:55:31+00:00" }, { "name": "CVE-2022-2663", "risk": 53, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T11:58:20+00:00", "updated_at": "2023-01-07T11:58:20+00:00" }, { "name": "CVE-2022-3646", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T12:24:02+00:00", "updated_at": "2023-01-07T12:24:02+00:00" }, { "name": "CVE-2022-3061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T13:01:08+00:00", "updated_at": "2023-01-07T13:01:08+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T13:44:04+00:00", "updated_at": "2023-01-07T13:44:04+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T14:23:13+00:00", "updated_at": "2023-01-07T14:23:13+00:00" }, { "name": "CVE-2022-43750", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T14:47:30+00:00", "updated_at": "2023-01-07T14:47:30+00:00" }, { "name": "CVE-2022-20421", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T14:50:04+00:00", "updated_at": "2023-01-07T14:50:04+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:08:37+00:00", "updated_at": "2023-01-07T15:08:37+00:00" }, { "name": "CVE-2022-39842", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:34:26+00:00", "updated_at": "2023-01-07T15:34:26+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:37:02+00:00", "updated_at": "2023-01-07T15:37:02+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:37:29+00:00", "updated_at": "2023-01-07T15:37:29+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T10:44:34+00:00", "updated_at": "2023-02-14T10:44:34+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:10:00+00:00", "updated_at": "2023-02-14T11:10:00+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:12:06+00:00", "updated_at": "2023-02-14T11:12:06+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:16:25+00:00", "updated_at": "2023-02-14T11:16:25+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:35:01+00:00", "updated_at": "2023-02-14T11:35:01+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:36:44+00:00", "updated_at": "2023-02-14T11:36:44+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:49:17+00:00", "updated_at": "2023-02-14T11:49:17+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:54:46+00:00", "updated_at": "2023-02-14T11:54:46+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2023-02-14T11:56:02+00:00", "updated_at": "2023-02-14T11:56:02+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-02-18T11:46:02+00:00", "updated_at": "2023-02-18T11:46:02+00:00" }, { "name": "CVE-2022-42432", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-04-21T09:24:11+00:00", "updated_at": "2023-04-21T09:24:11+00:00" }, { "name": "CVE-2022-2308", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-04-21T09:29:06+00:00", "updated_at": "2023-04-21T09:29:06+00:00" }, { "name": "CVE-2022-3903", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-04-21T09:37:08+00:00", "updated_at": "2023-04-21T09:37:08+00:00" }, { "name": "CVE-2023-2860", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "74e2e712a3fe131e68ea604157cebccd143520c63e0bbd7f5a5fa36260adfea4", "name": "linux-tools-host", "version": "5.15.0-57.63", "filename": "linux-tools-host_5.15.0-57.63_all.deb" }, "created_at": "2023-07-12T10:07:45+00:00", "updated_at": "2023-07-12T10:07:45+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 98, "malicious": 0, "created_at": "2022-11-15T13:59:03+00:00", "updated_at": "2022-11-17T10:20:14+00:00", "deleted_at": null }