Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (32)

linux-tools-4.15.0-189-lowlatency

Hashes
Linux kernel version specific tools for version 4.15.0-189 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.15.0-189 on 32 bit x86.
  • SHA256: 17af31665b6871959d69f365c054d5e65a7da5c6c4a0a762bb997bd25768af96
  • SHA1: a0ecab4c542da9bbfd40faf8f0b1247d68b9e739
  • MD5: 3055ac2ce10592a8febc2017002e8976
Information
  • Version: 4.15.0-189.200
  • Filename: linux-tools-4.15.0-189-lowlatency_4.15.0-189.200_i386.deb
  • Size: 682
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: linux-tools-4.15.0-189

Vulnerabilities

NameRiskSourceFixed
CVE-2022-339810USN
linux-doc
4.15.0-191.202
CVE-2022-11950USN
linux-doc
4.15.0-191.202
CVE-2022-25880USN
linux-doc
4.15.0-191.202
CVE-2022-25860USN
linux-doc
4.15.0-191.202
CVE-2022-197441USN
linux-doc
4.15.0-191.202
CVE-2022-16790USN
linux-doc
4.15.0-191.202
CVE-2022-17340USN
linux-doc
4.15.0-191.202
CVE-2022-165278USN
linux-doc
4.15.0-191.202
CVE-2022-04940USN
linux-doc
4.15.0-191.202
CVE-2022-10480USN
linux-doc
4.15.0-191.202
CVE-2022-349180USN
linux-doc
4.15.0-191.202
CVE-2022-197555USN
linux-doc
4.15.0-191.202
CVE-2022-172970USN
linux-doc
4.15.0-191.202
CVE-2022-197441USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-25880USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-349180USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-165278USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-11950USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-17340USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-04940USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-172970USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-197555USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-25860USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-16790USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-10480USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-339810USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-250367USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-250367USN
linux-doc
4.15.0-191.202
CVE-2022-205727USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-299167USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-299167USN
linux-doc
4.15.0-191.202
CVE-2022-205727USN
linux-doc
4.15.0-191.202

Raw Object

{
  "sha256": "17af31665b6871959d69f365c054d5e65a7da5c6c4a0a762bb997bd25768af96",
  "sha1": "a0ecab4c542da9bbfd40faf8f0b1247d68b9e739",
  "md5": "3055ac2ce10592a8febc2017002e8976",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-tools-4.15.0-189-lowlatency",
  "filename": "linux-tools-4.15.0-189-lowlatency_4.15.0-189.200_i386.deb",
  "size": 682,
  "description": "Linux kernel version specific tools for version 4.15.0-189\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-189 on\n32 bit x86.",
  "url": null,
  "version": "4.15.0-189.200",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "linux-tools-4.15.0-189",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T02:49:40+00:00",
      "updated_at": "2022-08-11T02:49:40+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:00:06+00:00",
      "updated_at": "2022-08-11T03:00:06+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:02:02+00:00",
      "updated_at": "2022-08-11T03:02:02+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:15:53+00:00",
      "updated_at": "2022-08-11T03:15:53+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:16:53+00:00",
      "updated_at": "2022-08-11T03:16:53+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:24:12+00:00",
      "updated_at": "2022-08-11T03:24:12+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:26:49+00:00",
      "updated_at": "2022-08-11T03:26:49+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:29:22+00:00",
      "updated_at": "2022-08-11T03:29:22+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:31:20+00:00",
      "updated_at": "2022-08-11T03:31:20+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:39:12+00:00",
      "updated_at": "2022-08-11T03:39:12+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:41:23+00:00",
      "updated_at": "2022-08-11T03:41:23+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:45:51+00:00",
      "updated_at": "2022-08-11T03:45:51+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:56:09+00:00",
      "updated_at": "2022-08-11T03:56:09+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:37:32+00:00",
      "updated_at": "2022-08-12T03:37:32+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:42:26+00:00",
      "updated_at": "2022-08-12T03:42:26+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:50:15+00:00",
      "updated_at": "2022-08-12T03:50:15+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:50:43+00:00",
      "updated_at": "2022-08-12T03:50:43+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:09:17+00:00",
      "updated_at": "2022-08-12T04:09:17+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:14:53+00:00",
      "updated_at": "2022-08-12T04:14:53+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:15:10+00:00",
      "updated_at": "2022-08-12T04:15:10+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:28:31+00:00",
      "updated_at": "2022-08-12T04:28:31+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:29:54+00:00",
      "updated_at": "2022-08-12T04:29:54+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:36:50+00:00",
      "updated_at": "2022-08-12T04:36:50+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:43:30+00:00",
      "updated_at": "2022-08-12T04:43:30+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:46:28+00:00",
      "updated_at": "2022-08-12T04:46:28+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:49:35+00:00",
      "updated_at": "2022-08-12T04:49:35+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-01-29T13:12:05+00:00",
      "updated_at": "2023-01-29T13:12:05+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-01-30T11:50:11+00:00",
      "updated_at": "2023-01-30T11:50:11+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-03-07T11:46:13+00:00",
      "updated_at": "2023-03-07T11:46:13+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-04-21T09:38:45+00:00",
      "updated_at": "2023-04-21T09:38:45+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-04-22T09:34:59+00:00",
      "updated_at": "2023-04-22T09:34:59+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-05-29T10:17:46+00:00",
      "updated_at": "2023-05-29T10:17:46+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-06-22T22:06:30+00:00",
  "updated_at": "2022-06-29T02:06:36+00:00",
  "deleted_at": null
}