4ba737c1d35d66e13eb141263f714c0cf44583ba3a773fd36985753a3d9c3310
2c614499edf90b510d2723549e9ef0e77dace7df
f8df988dd491562accd59eb7e22d246b
5.15.0-47.51
linux-cloud-tools-5.15.0-47-generic_5.15.0-47.51_amd64.deb
371
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
linux-cloud-tools-5.15.0-47
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-33741 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-36946 | 75 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-34494 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33744 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-26365 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33743 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2021-33655 | 78 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33740 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-2318 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-34495 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33742 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-3104 | 6 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-3110 | 6 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2023-2008 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
{ "sha256": "4ba737c1d35d66e13eb141263f714c0cf44583ba3a773fd36985753a3d9c3310", "sha1": "2c614499edf90b510d2723549e9ef0e77dace7df", "md5": "f8df988dd491562accd59eb7e22d246b", "type": "DEB", "arch": "AMD64", "name": "linux-cloud-tools-5.15.0-47-generic", "filename": "linux-cloud-tools-5.15.0-47-generic_5.15.0-47.51_amd64.deb", "size": 371, "description": "Linux kernel version specific cloud tools for version 5.15.0-47\nThis package provides the architecture dependant parts for kernel\nversion locked tools for cloud for version 5.15.0-47 on\n64 bit x86.", "url": null, "version": "5.15.0-47.51", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-cloud-tools-5.15.0-47", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-33741", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T16:49:31+00:00", "updated_at": "2022-09-21T16:49:31+00:00" }, { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:01:11+00:00", "updated_at": "2022-09-21T17:01:11+00:00" }, { "name": "CVE-2022-34494", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:05:43+00:00", "updated_at": "2022-09-21T17:05:43+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:06:15+00:00", "updated_at": "2022-09-21T17:06:15+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:06:17+00:00", "updated_at": "2022-09-21T17:06:17+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:26+00:00", "updated_at": "2022-09-21T17:07:26+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:37+00:00", "updated_at": "2022-09-21T17:07:37+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:45+00:00", "updated_at": "2022-09-21T17:07:45+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:02+00:00", "updated_at": "2022-09-21T17:08:02+00:00" }, { "name": "CVE-2022-34495", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:06+00:00", "updated_at": "2022-09-21T17:08:06+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:10+00:00", "updated_at": "2022-09-21T17:08:10+00:00" }, { "name": "CVE-2022-3104", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-03-07T11:44:04+00:00", "updated_at": "2023-03-07T11:44:04+00:00" }, { "name": "CVE-2022-3110", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-03-07T12:11:05+00:00", "updated_at": "2023-03-07T12:11:05+00:00" }, { "name": "CVE-2023-2008", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-05-13T10:47:32+00:00", "updated_at": "2023-05-13T10:47:32+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-08-11T09:10:10+00:00", "updated_at": "2022-08-16T03:17:16+00:00", "deleted_at": null }