Raw Object
{
"sha256": "6f85b274162a8a9c27a01e35df3808cb2bf7d127390f9d90f5c2fd4ce6c75596",
"sha1": "58585f49e9edfda0a4dabb5f80f4d371f9971058",
"md5": "136fbe4cd056959040b17ea3a215d589",
"type": "DEB",
"arch": "ALL",
"name": "linux-intel-iotg-headers-5.15.0-1013",
"filename": "linux-intel-iotg-headers-5.15.0-1013_5.15.0-1013.17_all.deb",
"size": 75510,
"description": "Header files related to Linux kernel version 5.15.0\nThis package provides kernel header files for version 5.15.0, for sites\nthat want the latest kernel headers. Please read\n/usr/share/doc/linux-intel-iotg-headers-5.15.0-1013/debian.README.gz for details",
"url": null,
"version": "5.15.0-1013.17",
"source": "linux-intel-iotg",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "coreutils",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2022-1852",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:24:17+00:00",
"updated_at": "2022-09-16T21:24:17+00:00"
},
{
"name": "CVE-2022-2873",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:30:33+00:00",
"updated_at": "2022-09-16T21:30:33+00:00"
},
{
"name": "CVE-2022-1729",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:30:57+00:00",
"updated_at": "2022-09-16T21:30:57+00:00"
},
{
"name": "CVE-2022-1973",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:40:21+00:00",
"updated_at": "2022-09-16T21:40:21+00:00"
},
{
"name": "CVE-2022-1943",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:41:50+00:00",
"updated_at": "2022-09-16T21:41:50+00:00"
},
{
"name": "CVE-2022-2503",
"risk": 67,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:42:01+00:00",
"updated_at": "2022-09-16T21:42:01+00:00"
},
{
"name": "CVE-2022-2959",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:42:19+00:00",
"updated_at": "2022-09-16T21:42:19+00:00"
},
{
"name": "CVE-2022-1012",
"risk": 91,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:48:10+00:00",
"updated_at": "2022-09-16T21:48:10+00:00"
},
{
"name": "CVE-2021-33061",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:48:46+00:00",
"updated_at": "2022-09-16T21:48:46+00:00"
},
{
"name": "CVE-2022-32296",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "3f0644143f35eceb1c1ee7609674ed457cd6cc649d09e9da649f7146d1668dfe",
"name": "linux-intel-iotg-tools-host",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-host_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-16T21:53:58+00:00",
"updated_at": "2022-09-16T21:53:58+00:00"
},
{
"name": "CVE-2022-2959",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:13:31+00:00",
"updated_at": "2022-09-17T16:13:31+00:00"
},
{
"name": "CVE-2022-1943",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:14:15+00:00",
"updated_at": "2022-09-17T16:14:15+00:00"
},
{
"name": "CVE-2022-1852",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:14:44+00:00",
"updated_at": "2022-09-17T16:14:44+00:00"
},
{
"name": "CVE-2022-1012",
"risk": 91,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:15:47+00:00",
"updated_at": "2022-09-17T16:15:47+00:00"
},
{
"name": "CVE-2021-33061",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:19:11+00:00",
"updated_at": "2022-09-17T16:19:11+00:00"
},
{
"name": "CVE-2022-2873",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:20:13+00:00",
"updated_at": "2022-09-17T16:20:13+00:00"
},
{
"name": "CVE-2022-2503",
"risk": 67,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:21:06+00:00",
"updated_at": "2022-09-17T16:21:06+00:00"
},
{
"name": "CVE-2022-1973",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:21:22+00:00",
"updated_at": "2022-09-17T16:21:22+00:00"
},
{
"name": "CVE-2022-32296",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:25:34+00:00",
"updated_at": "2022-09-17T16:25:34+00:00"
},
{
"name": "CVE-2022-1729",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2022-09-17T16:26:11+00:00",
"updated_at": "2022-09-17T16:26:11+00:00"
},
{
"name": "CVE-2022-3577",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-02-18T11:25:29+00:00",
"updated_at": "2023-02-18T11:25:29+00:00"
},
{
"name": "CVE-2022-3077",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-02-18T12:10:37+00:00",
"updated_at": "2023-02-18T12:10:37+00:00"
},
{
"name": "CVE-2022-20572",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-03-07T11:46:34+00:00",
"updated_at": "2023-03-07T11:46:34+00:00"
},
{
"name": "CVE-2022-3115",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-03-07T12:09:25+00:00",
"updated_at": "2023-03-07T12:09:25+00:00"
},
{
"name": "CVE-2023-1838",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-04-21T09:27:18+00:00",
"updated_at": "2023-04-21T09:27:18+00:00"
},
{
"name": "CVE-2022-1974",
"risk": 41,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-04-21T09:33:11+00:00",
"updated_at": "2023-04-21T09:33:11+00:00"
},
{
"name": "CVE-2023-4387",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-09-13T09:51:06+00:00",
"updated_at": "2023-09-13T09:51:06+00:00"
},
{
"name": "CVE-2023-4459",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-09-13T10:29:11+00:00",
"updated_at": "2023-09-13T10:29:11+00:00"
},
{
"name": "CVE-2023-4385",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b29281036d642b4084a3a47f0c03e6ffba39fbc352386d9213abd52aea93f7e1",
"name": "linux-intel-iotg-tools-common",
"version": "5.15.0-1015.20",
"filename": "linux-intel-iotg-tools-common_5.15.0-1015.20_all.deb"
},
"created_at": "2023-09-13T10:59:51+00:00",
"updated_at": "2023-09-13T10:59:51+00:00"
}
],
"risk": 91,
"vulnerable": 91,
"outdated": 91,
"malicious": 0,
"created_at": "2022-08-07T19:34:10+00:00",
"updated_at": "2022-08-10T03:29:57+00:00",
"deleted_at": null
}