Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (18)

linux-image-4.15.0-190-generic

Hashes
Linux kernel image for version 4.15.0 on 32 bit x86 SMP This package contains the Linux kernel image for version 4.15.0 on 32 bit x86 SMP. Supports Generic processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-generic meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 38b4108c2e12a0274eb85ce630aa722201cef59434e474074b91c8bd67c5ce5b
  • SHA1: 60b52ba46bc2c0890559dbb0bc85e86f14a489ed
  • MD5: 2cff68491d4bf7f2853cdee4adaeaea2
Information
  • Version: 4.15.0-190.201
  • Filename: linux-image-4.15.0-190-generic_4.15.0-190.201_i386.deb
  • Size: 8220
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-190-generic

Vulnerabilities

NameRiskSourceFixed
CVE-2022-339810USN
linux-doc
4.15.0-191.202
CVE-2022-11950USN
linux-doc
4.15.0-191.202
CVE-2022-25880USN
linux-doc
4.15.0-191.202
CVE-2022-25860USN
linux-doc
4.15.0-191.202
CVE-2022-197441USN
linux-doc
4.15.0-191.202
CVE-2022-16790USN
linux-doc
4.15.0-191.202
CVE-2022-17340USN
linux-doc
4.15.0-191.202
CVE-2022-165278USN
linux-doc
4.15.0-191.202
CVE-2022-04940USN
linux-doc
4.15.0-191.202
CVE-2022-10480USN
linux-doc
4.15.0-191.202
CVE-2022-349180USN
linux-doc
4.15.0-191.202
CVE-2022-197555USN
linux-doc
4.15.0-191.202
CVE-2022-172970USN
linux-doc
4.15.0-191.202
CVE-2021-336560USN
linux-doc
4.15.0-192.203
CVE-2022-250367USN
linux-doc
4.15.0-191.202
CVE-2022-205727USN
linux-doc
4.15.0-191.202
CVE-2022-197441USN
linux-doc
4.15.0-192.203
CVE-2022-299167USN
linux-doc
4.15.0-191.202

Raw Object

{
  "sha256": "38b4108c2e12a0274eb85ce630aa722201cef59434e474074b91c8bd67c5ce5b",
  "sha1": "60b52ba46bc2c0890559dbb0bc85e86f14a489ed",
  "md5": "2cff68491d4bf7f2853cdee4adaeaea2",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-image-4.15.0-190-generic",
  "filename": "linux-image-4.15.0-190-generic_4.15.0-190.201_i386.deb",
  "size": 8220,
  "description": "Linux kernel image for version 4.15.0 on 32 bit x86 SMP\nThis package contains the Linux kernel image for version 4.15.0 on\n32 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "4.15.0-190.201",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-190-generic",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T02:49:41+00:00",
      "updated_at": "2022-08-11T02:49:41+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:00:07+00:00",
      "updated_at": "2022-08-11T03:00:07+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:02:02+00:00",
      "updated_at": "2022-08-11T03:02:02+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:15:53+00:00",
      "updated_at": "2022-08-11T03:15:53+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:16:54+00:00",
      "updated_at": "2022-08-11T03:16:54+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:24:13+00:00",
      "updated_at": "2022-08-11T03:24:13+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:26:49+00:00",
      "updated_at": "2022-08-11T03:26:49+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:29:23+00:00",
      "updated_at": "2022-08-11T03:29:23+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:31:21+00:00",
      "updated_at": "2022-08-11T03:31:21+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:39:12+00:00",
      "updated_at": "2022-08-11T03:39:12+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:41:24+00:00",
      "updated_at": "2022-08-11T03:41:24+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:45:51+00:00",
      "updated_at": "2022-08-11T03:45:51+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:56:10+00:00",
      "updated_at": "2022-08-11T03:56:10+00:00"
    },
    {
      "name": "CVE-2021-33656",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6213cd18fee51b3baf4d4af5a591fc145dec147e53fba4ab6e6af4d9d8b85361",
        "name": "linux-doc",
        "version": "4.15.0-192.203",
        "filename": "linux-doc_4.15.0-192.203_all.deb"
      },
      "created_at": "2022-09-02T04:46:48+00:00",
      "updated_at": "2022-09-02T04:46:48+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-01-29T13:12:05+00:00",
      "updated_at": "2023-01-29T13:12:05+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-03-07T11:46:14+00:00",
      "updated_at": "2023-03-07T11:46:14+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6213cd18fee51b3baf4d4af5a591fc145dec147e53fba4ab6e6af4d9d8b85361",
        "name": "linux-doc",
        "version": "4.15.0-192.203",
        "filename": "linux-doc_4.15.0-192.203_all.deb"
      },
      "created_at": "2023-04-21T09:32:57+00:00",
      "updated_at": "2023-04-21T09:32:57+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-04-21T09:38:45+00:00",
      "updated_at": "2023-04-21T09:38:45+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-07-13T04:29:45+00:00",
  "updated_at": "2022-07-14T02:15:51+00:00",
  "deleted_at": null
}