Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (43)

linux-cloud-tools-4.15.0-201

Hashes
Linux kernel version specific cloud tools for version 4.15.0-201 This package provides the architecture dependant parts for kernel version locked tools for cloud tools for version 4.15.0-201 on 64 bit x86. You probably want to install linux-cloud-tools-4.15.0-201-<flavour>.
  • SHA256: b59b49207661b6471146203f9c5cd2c389070885d26c45ac9615604c3a20394e
  • SHA1: 7e5d5e0d93e50d9d2316387e454d2345d1db380c
  • MD5: 771c976f1b40e8532a12b8c6e534a42c
Information
  • Version: 4.15.0-201.212
  • Filename: linux-cloud-tools-4.15.0-201_4.15.0-201.212_amd64.deb
  • Size: 770
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.14), linux-cloud-tools-common

Applications

NameTypeArchSizeRisk
hv_fcopy_daemon
/usr/lib/linux-tools-4.15.0-201/hv_fcopy_daemon
136880
hv_kvp_daemon
/usr/lib/linux-tools-4.15.0-201/hv_kvp_daemon
369440
hv_vss_daemon
/usr/lib/linux-tools-4.15.0-201/hv_vss_daemon
139040

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-4270355USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356671USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356480USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356771USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-36218USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-352475USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356580USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-323978USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-323978USN
linux-libc-dev
4.15.0-200.211
CVE-2022-352475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-4270355USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356580USN
linux-libc-dev
4.15.0-200.211
CVE-2022-36218USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356771USN
linux-libc-dev
4.15.0-200.211
CVE-2022-359475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356671USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356480USN
linux-libc-dev
4.15.0-200.211
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-364310USN
linux-libc-dev
4.15.0-202.213
CVE-2022-428969USN
linux-libc-dev
4.15.0-202.213
CVE-2022-439458USN
linux-libc-dev
4.15.0-202.213
CVE-2022-459348USN
linux-libc-dev
4.15.0-202.213
CVE-2022-352475USN
linux-tools-host
4.15.0-200.211
CVE-2022-459348USN
linux-tools-host
4.15.0-202.213
CVE-2022-439458USN
linux-tools-host
4.15.0-202.213
CVE-2022-356671USN
linux-tools-host
4.15.0-200.211
CVE-2022-356771USN
linux-tools-host
4.15.0-200.211
CVE-2022-36218USN
linux-tools-host
4.15.0-200.211
CVE-2022-356580USN
linux-tools-host
4.15.0-200.211
CVE-2022-428969USN
linux-tools-host
4.15.0-202.213
CVE-2022-364310USN
linux-tools-host
4.15.0-202.213
CVE-2022-4270355USN
linux-tools-host
4.15.0-200.211
CVE-2022-323978USN
linux-tools-host
4.15.0-200.211
CVE-2022-359475USN
linux-tools-host
4.15.0-200.211
CVE-2022-356480USN
linux-tools-host
4.15.0-200.211
CVE-2022-439458USN
linux-source-4.15.0
4.15.0-202.213
CVE-2022-428969USN
linux-source-4.15.0
4.15.0-202.213
CVE-2022-459348USN
linux-source-4.15.0
4.15.0-202.213
CVE-2022-364310USN
linux-source-4.15.0
4.15.0-202.213

Raw Object

{
  "sha256": "b59b49207661b6471146203f9c5cd2c389070885d26c45ac9615604c3a20394e",
  "sha1": "7e5d5e0d93e50d9d2316387e454d2345d1db380c",
  "md5": "771c976f1b40e8532a12b8c6e534a42c",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-cloud-tools-4.15.0-201",
  "filename": "linux-cloud-tools-4.15.0-201_4.15.0-201.212_amd64.deb",
  "size": 770,
  "description": "Linux kernel version specific cloud tools for version 4.15.0-201\nThis package provides the architecture dependant parts for kernel\nversion locked tools for cloud tools for version 4.15.0-201 on\n64 bit x86.\nYou probably want to install linux-cloud-tools-4.15.0-201-<flavour>.",
  "url": null,
  "version": "4.15.0-201.212",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.14), linux-cloud-tools-common",
  "applications": [
    {
      "path": "/usr/lib/linux-tools-4.15.0-201/hv_fcopy_daemon",
      "sha256": "1fb32ee86953d985c03bf479cab692c1cb5b6bcfbfd9b2ec0d8baee1bfdda8a0",
      "sha1": "6a56965f4f8d753f7125098b12ae6def72fd9a22",
      "md5": "051ebce17c4d7298a4729eb944e9302b",
      "name": "hv_fcopy_daemon",
      "size": 13688,
      "description": null,
      "package": 4941663,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-02T11:03:10+00:00",
      "updated_at": "2022-12-02T11:03:10+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-201/hv_kvp_daemon",
      "sha256": "7ea738fd076b4e44a1e1565e1d3ccfc4f40ef8c5b364b49fcfb13e85126b3e9b",
      "sha1": "d0542978b1abf4d34c76343f4b863b51d34bb578",
      "md5": "cb3001af5c0ea51598b34f487fc1adb8",
      "name": "hv_kvp_daemon",
      "size": 36944,
      "description": null,
      "package": 4941663,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-02T11:03:10+00:00",
      "updated_at": "2022-12-02T11:03:10+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-201/hv_vss_daemon",
      "sha256": "9c78444795f0438f39608cc2aeae33dd3382101646bfb4913b80e429298f1b47",
      "sha1": "9f0ba48d12cef9edc428803d30cfbde99ca6772d",
      "md5": "1535b1deb86780da651ab82f754497ca",
      "name": "hv_vss_daemon",
      "size": 13904,
      "description": null,
      "package": 4941663,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-02T11:03:10+00:00",
      "updated_at": "2022-12-02T11:03:10+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:23:20+00:00",
      "updated_at": "2022-12-02T12:23:20+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:39:34+00:00",
      "updated_at": "2022-12-02T12:39:34+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:41:26+00:00",
      "updated_at": "2022-12-02T12:41:26+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:10+00:00",
      "updated_at": "2022-12-02T12:42:10+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:59+00:00",
      "updated_at": "2022-12-02T12:42:59+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:44:05+00:00",
      "updated_at": "2022-12-02T12:44:05+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:45:28+00:00",
      "updated_at": "2022-12-02T12:45:28+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:11+00:00",
      "updated_at": "2022-12-02T12:46:11+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:51+00:00",
      "updated_at": "2022-12-02T12:46:51+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:37:37+00:00",
      "updated_at": "2022-12-03T12:37:37+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:38:48+00:00",
      "updated_at": "2022-12-03T12:38:48+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:40:50+00:00",
      "updated_at": "2022-12-03T12:40:50+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:41:30+00:00",
      "updated_at": "2022-12-03T12:41:30+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:42:35+00:00",
      "updated_at": "2022-12-03T12:42:35+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:43:10+00:00",
      "updated_at": "2022-12-03T12:43:10+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:44:08+00:00",
      "updated_at": "2022-12-03T12:44:08+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:44:52+00:00",
      "updated_at": "2022-12-03T12:44:52+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-03T12:45:28+00:00",
      "updated_at": "2022-12-03T12:45:28+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:43:11+00:00",
      "updated_at": "2023-01-13T10:43:11+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:36+00:00",
      "updated_at": "2023-01-13T10:52:36+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:01+00:00",
      "updated_at": "2023-01-13T10:53:01+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:05+00:00",
      "updated_at": "2023-01-13T10:55:05+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-22T10:57:53+00:00",
      "updated_at": "2023-01-22T10:57:53+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-22T10:58:19+00:00",
      "updated_at": "2023-01-22T10:58:19+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-22T10:58:44+00:00",
      "updated_at": "2023-01-22T10:58:44+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-22T11:00:42+00:00",
      "updated_at": "2023-01-22T11:00:42+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T10:44:26+00:00",
      "updated_at": "2023-02-14T10:44:26+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795",
        "name": "linux-tools-host",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-host_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-02-14T10:49:29+00:00",
      "updated_at": "2023-02-14T10:49:29+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795",
        "name": "linux-tools-host",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-host_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-02-14T11:09:53+00:00",
      "updated_at": "2023-02-14T11:09:53+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:11:58+00:00",
      "updated_at": "2023-02-14T11:11:58+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:16:18+00:00",
      "updated_at": "2023-02-14T11:16:18+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:34:53+00:00",
      "updated_at": "2023-02-14T11:34:53+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:36:36+00:00",
      "updated_at": "2023-02-14T11:36:36+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795",
        "name": "linux-tools-host",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-host_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-02-14T11:45:37+00:00",
      "updated_at": "2023-02-14T11:45:37+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "af0710869158d0cbc08ea9d0764c5941a25200b2d7e57725b7ace7ec9dc2a795",
        "name": "linux-tools-host",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-host_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-02-14T11:47:51+00:00",
      "updated_at": "2023-02-14T11:47:51+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:49:10+00:00",
      "updated_at": "2023-02-14T11:49:10+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:53:44+00:00",
      "updated_at": "2023-02-14T11:53:44+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:54:38+00:00",
      "updated_at": "2023-02-14T11:54:38+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9fd7acab910e36996b8e523dc74d9bf144e3cf18c56b2202fa3f0a49fd68b19b",
        "name": "linux-tools-host",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-host_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-02-14T11:55:54+00:00",
      "updated_at": "2023-02-14T11:55:54+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1fdb75db28dd9c68ce3a35b734ff84ded45ce956af4c49194f4bc4825eb52837",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-202.213",
        "filename": "linux-source-4.15.0_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-03-03T10:31:37+00:00",
      "updated_at": "2023-03-03T10:31:37+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1fdb75db28dd9c68ce3a35b734ff84ded45ce956af4c49194f4bc4825eb52837",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-202.213",
        "filename": "linux-source-4.15.0_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-03-03T10:38:12+00:00",
      "updated_at": "2023-03-03T10:38:12+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1fdb75db28dd9c68ce3a35b734ff84ded45ce956af4c49194f4bc4825eb52837",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-202.213",
        "filename": "linux-source-4.15.0_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-03-03T10:49:32+00:00",
      "updated_at": "2023-03-03T10:49:32+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1fdb75db28dd9c68ce3a35b734ff84ded45ce956af4c49194f4bc4825eb52837",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-202.213",
        "filename": "linux-source-4.15.0_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-03-05T10:42:44+00:00",
      "updated_at": "2023-03-05T10:42:44+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-28T13:20:18+00:00",
  "updated_at": "2022-12-02T11:03:10+00:00",
  "deleted_at": null
}