9b6bcfff3ef4d44ef0677bd23a31a7ce429894f6764d349164db9276ad074be5
c8f42bdd721240155c12d21a99c4f893090c5572
e7f790783ab500412577cb7cadac0bdd
4.15.0-201.212
linux-tools-host_4.15.0-201.212_all.deb
761
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
python3
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3594 | 75 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-42703 | 55 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-3566 | 71 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-3564 | 80 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-3567 | 71 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-3621 | 8 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-3524 | 75 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-3565 | 80 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-3239 | 78 | USN | linux-tools-host 4.15.0-200.211 |
CVE-2022-42896 | 9 | USN | |
CVE-2022-45934 | 8 | USN | |
CVE-2022-43945 | 8 | USN | |
CVE-2022-3643 | 10 | USN | |
CVE-2022-43945 | 8 | USN | linux-tools-host 4.15.0-202.213 |
CVE-2022-45934 | 8 | USN | linux-tools-host 4.15.0-202.213 |
CVE-2022-42896 | 9 | USN | linux-tools-host 4.15.0-202.213 |
CVE-2022-3643 | 10 | USN | linux-tools-host 4.15.0-202.213 |
{ "sha256": "9b6bcfff3ef4d44ef0677bd23a31a7ce429894f6764d349164db9276ad074be5", "sha1": "c8f42bdd721240155c12d21a99c4f893090c5572", "md5": "e7f790783ab500412577cb7cadac0bdd", "type": "DEB", "arch": "ALL", "name": "linux-tools-host", "filename": "linux-tools-host_4.15.0-201.212_all.deb", "size": 761, "description": "Linux kernel VM host tools\nThis package provides kernel tools useful for VM hosts.", "url": null, "version": "4.15.0-201.212", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "python3", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:23:22+00:00", "updated_at": "2022-12-02T12:23:22+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:39:37+00:00", "updated_at": "2022-12-02T12:39:37+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:41:30+00:00", "updated_at": "2022-12-02T12:41:30+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:42:14+00:00", "updated_at": "2022-12-02T12:42:14+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:43:02+00:00", "updated_at": "2022-12-02T12:43:02+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:44:08+00:00", "updated_at": "2022-12-02T12:44:08+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:45:30+00:00", "updated_at": "2022-12-02T12:45:30+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:46:13+00:00", "updated_at": "2022-12-02T12:46:13+00:00" }, { "name": "CVE-2022-3239", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b", "name": "linux-tools-host", "version": "4.15.0-200.211", "filename": "linux-tools-host_4.15.0-200.211_all.deb" }, "created_at": "2022-12-02T12:46:52+00:00", "updated_at": "2022-12-02T12:46:52+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:43:13+00:00", "updated_at": "2023-01-13T10:43:13+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:52:38+00:00", "updated_at": "2023-01-13T10:52:38+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:53:03+00:00", "updated_at": "2023-01-13T10:53:03+00:00" }, { "name": "CVE-2022-3643", "risk": 10, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:55:07+00:00", "updated_at": "2023-01-13T10:55:07+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795", "name": "linux-tools-host", "version": "4.15.0-202.213", "filename": "linux-tools-host_4.15.0-202.213_all.deb" }, "created_at": "2023-01-14T10:24:54+00:00", "updated_at": "2023-01-14T10:24:54+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795", "name": "linux-tools-host", "version": "4.15.0-202.213", "filename": "linux-tools-host_4.15.0-202.213_all.deb" }, "created_at": "2023-01-14T10:26:00+00:00", "updated_at": "2023-01-14T10:26:00+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795", "name": "linux-tools-host", "version": "4.15.0-202.213", "filename": "linux-tools-host_4.15.0-202.213_all.deb" }, "created_at": "2023-01-14T10:26:16+00:00", "updated_at": "2023-01-14T10:26:16+00:00" }, { "name": "CVE-2022-3643", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795", "name": "linux-tools-host", "version": "4.15.0-202.213", "filename": "linux-tools-host_4.15.0-202.213_all.deb" }, "created_at": "2023-01-14T10:26:37+00:00", "updated_at": "2023-01-14T10:26:37+00:00" } ], "risk": 100, "vulnerable": 100, "outdated": 100, "malicious": 0, "created_at": "2022-11-28T13:20:18+00:00", "updated_at": "2022-12-02T11:18:59+00:00", "deleted_at": null }