d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539
a5ae8ed0d41e80a9dd968920d9179dff540c6626
493bd8a04464797dc10748680a938087
5.15.0-1027.32
linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb
581
DEB
linux-intel-iotg
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
python3
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-1074 | 6 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-1073 | 7 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2022-4842 | 0 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-1281 | 8 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-0394 | 6 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-1652 | 0 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-26545 | 8 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2022-4129 | 6 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-0386 | 8 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2022-47929 | 6 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-0458 | 0 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-21102 | 0 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
CVE-2023-3358 | 0 | USN | linux-intel-iotg-tools-host 5.15.0-1028.33 |
{ "sha256": "d0fe3426b076643bdf9ff3225da915e0a8adbe2ad9813907bbba169dc4343539", "sha1": "a5ae8ed0d41e80a9dd968920d9179dff540c6626", "md5": "493bd8a04464797dc10748680a938087", "type": "DEB", "arch": "ALL", "name": "linux-intel-iotg-tools-host", "filename": "linux-intel-iotg-tools-host_5.15.0-1027.32_all.deb", "size": 581, "description": "Linux kernel VM host tools\nThis package provides kernel tools useful for VM hosts.", "url": null, "version": "5.15.0-1027.32", "source": "linux-intel-iotg", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "python3", "applications": [], "vulnerabilities": [ { "name": "CVE-2023-1074", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:16:48+00:00", "updated_at": "2023-05-06T09:16:48+00:00" }, { "name": "CVE-2023-1073", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:18:01+00:00", "updated_at": "2023-05-06T09:18:01+00:00" }, { "name": "CVE-2022-4842", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:19:53+00:00", "updated_at": "2023-05-06T09:19:53+00:00" }, { "name": "CVE-2023-1281", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:20:42+00:00", "updated_at": "2023-05-06T09:20:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:21:45+00:00", "updated_at": "2023-05-06T09:21:45+00:00" }, { "name": "CVE-2023-1652", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:22:14+00:00", "updated_at": "2023-05-06T09:22:14+00:00" }, { "name": "CVE-2023-26545", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:22:56+00:00", "updated_at": "2023-05-06T09:22:56+00:00" }, { "name": "CVE-2022-4129", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:23:04+00:00", "updated_at": "2023-05-06T09:23:04+00:00" }, { "name": "CVE-2023-0386", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:24:14+00:00", "updated_at": "2023-05-06T09:24:14+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-06T09:24:58+00:00", "updated_at": "2023-05-06T09:24:58+00:00" }, { "name": "CVE-2023-0458", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-13T11:29:08+00:00", "updated_at": "2023-05-13T11:29:08+00:00" }, { "name": "CVE-2023-21102", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-05-13T12:31:56+00:00", "updated_at": "2023-05-13T12:31:56+00:00" }, { "name": "CVE-2023-3358", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ad8033dd00077879172fd89fcaaacf4d872009b88a5a20ea4bf27b5f3607f7a3", "name": "linux-intel-iotg-tools-host", "version": "5.15.0-1028.33", "filename": "linux-intel-iotg-tools-host_5.15.0-1028.33_all.deb" }, "created_at": "2023-07-12T10:05:13+00:00", "updated_at": "2023-07-12T10:05:13+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-03-03T18:33:09+00:00", "updated_at": "2023-03-16T10:11:00+00:00", "deleted_at": null }