Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (17)

linux-tools-4.15.0-197-generic

Hashes
Linux kernel version specific tools for version 4.15.0-197 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.15.0-197 on 64 bit x86.
  • SHA256: 22b8680560121bc303697994a67052fc681539a6d1fd3671d2975ae551be1dc1
  • SHA1: e07914646302f7c1a7b85c237d9705aab7037a1b
  • MD5: 715f816f609eb6d8bf4e73461ee45fe5
Information
  • Version: 4.15.0-197.208
  • Filename: linux-tools-4.15.0-197-generic_4.15.0-197.208_amd64.deb
  • Size: 708
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: linux-tools-4.15.0-197

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-4270355USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356671USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356480USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356771USN
linux-libc-dev
4.15.0-200.211
CVE-2022-36218USN
linux-libc-dev
4.15.0-200.211
CVE-2022-352475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356580USN
linux-libc-dev
4.15.0-200.211
CVE-2022-323978USN
linux-libc-dev
4.15.0-200.211
CVE-2022-306155USN
linux-libc-dev
4.15.0-201.212
CVE-2022-3918847USN
linux-libc-dev
4.15.0-201.212
CVE-2022-358655USN
linux-libc-dev
4.15.0-201.212
CVE-2021-415944USN
linux-libc-dev
4.15.0-201.212
CVE-2022-2042178USN
linux-libc-dev
4.15.0-201.212
CVE-2022-4030747USN
linux-libc-dev
4.15.0-201.212
CVE-2022-40958USN
linux-libc-dev
4.15.0-201.212
CVE-2022-46620USN
linux-libc-dev
4.15.0-201.212

Raw Object

{
  "sha256": "22b8680560121bc303697994a67052fc681539a6d1fd3671d2975ae551be1dc1",
  "sha1": "e07914646302f7c1a7b85c237d9705aab7037a1b",
  "md5": "715f816f609eb6d8bf4e73461ee45fe5",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-tools-4.15.0-197-generic",
  "filename": "linux-tools-4.15.0-197-generic_4.15.0-197.208_amd64.deb",
  "size": 708,
  "description": "Linux kernel version specific tools for version 4.15.0-197\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-197 on\n64 bit x86.",
  "url": null,
  "version": "4.15.0-197.208",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "linux-tools-4.15.0-197",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:23:17+00:00",
      "updated_at": "2022-12-02T12:23:17+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:39:32+00:00",
      "updated_at": "2022-12-02T12:39:32+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:41:23+00:00",
      "updated_at": "2022-12-02T12:41:23+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:42:08+00:00",
      "updated_at": "2022-12-02T12:42:08+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:42:58+00:00",
      "updated_at": "2022-12-02T12:42:58+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:44:02+00:00",
      "updated_at": "2022-12-02T12:44:02+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:45:25+00:00",
      "updated_at": "2022-12-02T12:45:25+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:46:09+00:00",
      "updated_at": "2022-12-02T12:46:09+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-02T12:46:48+00:00",
      "updated_at": "2022-12-02T12:46:48+00:00"
    },
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-01-07T13:00:54+00:00",
      "updated_at": "2023-01-07T13:00:54+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-01-07T13:43:50+00:00",
      "updated_at": "2023-01-07T13:43:50+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-01-07T14:23:01+00:00",
      "updated_at": "2023-01-07T14:23:01+00:00"
    },
    {
      "name": "CVE-2021-4159",
      "risk": 44,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-01-07T14:41:24+00:00",
      "updated_at": "2023-01-07T14:41:24+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-01-07T14:49:50+00:00",
      "updated_at": "2023-01-07T14:49:50+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-01-07T15:08:23+00:00",
      "updated_at": "2023-01-07T15:08:23+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-01-07T15:37:16+00:00",
      "updated_at": "2023-01-07T15:37:16+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "9ab5249b7cdb5f128f172b23d47bebdd3a1b57f6c6db777c2b1d3269577dbda5",
        "name": "linux-libc-dev",
        "version": "4.15.0-201.212",
        "filename": "linux-libc-dev_4.15.0-201.212_i386.deb"
      },
      "created_at": "2023-02-18T11:45:53+00:00",
      "updated_at": "2023-02-18T11:45:53+00:00"
    }
  ],
  "risk": 80,
  "vulnerable": 80,
  "outdated": 80,
  "malicious": 0,
  "created_at": "2022-11-01T19:20:51+00:00",
  "updated_at": "2022-11-06T11:01:31+00:00",
  "deleted_at": null
}