Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (32)

linux-image-unsigned-4.15.0-189-generic

Hashes
Linux kernel image for version 4.15.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 4.15.0 on 64 bit x86 SMP. Supports Generic processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-generic meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 50cb8ef84ddebbc6fb7e4dcc2ce35307e04fb6f0176ad7920ddf10cb6fa6865c
  • SHA1: 4d01bff4199399feea2242ac2e3058dd6a2a4f47
  • MD5: d5312ce22a1e8380f29fa67ca674e45e
Information
  • Version: 4.15.0-189.200
  • Filename: linux-image-unsigned-4.15.0-189-generic_4.15.0-189.200_amd64.deb
  • Size: 8957
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-189-generic

Vulnerabilities

NameRiskSourceFixed
CVE-2022-339810USN
linux-doc
4.15.0-191.202
CVE-2022-11950USN
linux-doc
4.15.0-191.202
CVE-2022-25880USN
linux-doc
4.15.0-191.202
CVE-2022-25860USN
linux-doc
4.15.0-191.202
CVE-2022-197441USN
linux-doc
4.15.0-191.202
CVE-2022-16790USN
linux-doc
4.15.0-191.202
CVE-2022-17340USN
linux-doc
4.15.0-191.202
CVE-2022-165278USN
linux-doc
4.15.0-191.202
CVE-2022-04940USN
linux-doc
4.15.0-191.202
CVE-2022-10480USN
linux-doc
4.15.0-191.202
CVE-2022-349180USN
linux-doc
4.15.0-191.202
CVE-2022-197555USN
linux-doc
4.15.0-191.202
CVE-2022-172970USN
linux-doc
4.15.0-191.202
CVE-2022-197441USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-25880USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-349180USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-165278USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-11950USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-17340USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-04940USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-172970USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-197555USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-25860USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-16790USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-10480USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-339810USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-250367USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-250367USN
linux-doc
4.15.0-191.202
CVE-2022-205727USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-299167USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-299167USN
linux-doc
4.15.0-191.202
CVE-2022-205727USN
linux-doc
4.15.0-191.202

Raw Object

{
  "sha256": "50cb8ef84ddebbc6fb7e4dcc2ce35307e04fb6f0176ad7920ddf10cb6fa6865c",
  "sha1": "4d01bff4199399feea2242ac2e3058dd6a2a4f47",
  "md5": "d5312ce22a1e8380f29fa67ca674e45e",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-4.15.0-189-generic",
  "filename": "linux-image-unsigned-4.15.0-189-generic_4.15.0-189.200_amd64.deb",
  "size": 8957,
  "description": "Linux kernel image for version 4.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 4.15.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "4.15.0-189.200",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-189-generic",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T02:49:40+00:00",
      "updated_at": "2022-08-11T02:49:40+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:00:06+00:00",
      "updated_at": "2022-08-11T03:00:06+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:02:01+00:00",
      "updated_at": "2022-08-11T03:02:01+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:15:52+00:00",
      "updated_at": "2022-08-11T03:15:52+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:16:53+00:00",
      "updated_at": "2022-08-11T03:16:53+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:24:12+00:00",
      "updated_at": "2022-08-11T03:24:12+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:26:49+00:00",
      "updated_at": "2022-08-11T03:26:49+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:29:22+00:00",
      "updated_at": "2022-08-11T03:29:22+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:31:20+00:00",
      "updated_at": "2022-08-11T03:31:20+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:39:11+00:00",
      "updated_at": "2022-08-11T03:39:11+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:41:23+00:00",
      "updated_at": "2022-08-11T03:41:23+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:45:51+00:00",
      "updated_at": "2022-08-11T03:45:51+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:56:09+00:00",
      "updated_at": "2022-08-11T03:56:09+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:37:32+00:00",
      "updated_at": "2022-08-12T03:37:32+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:42:26+00:00",
      "updated_at": "2022-08-12T03:42:26+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:50:15+00:00",
      "updated_at": "2022-08-12T03:50:15+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T03:50:42+00:00",
      "updated_at": "2022-08-12T03:50:42+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:09:16+00:00",
      "updated_at": "2022-08-12T04:09:16+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:14:53+00:00",
      "updated_at": "2022-08-12T04:14:53+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:15:09+00:00",
      "updated_at": "2022-08-12T04:15:09+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:28:31+00:00",
      "updated_at": "2022-08-12T04:28:31+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:29:54+00:00",
      "updated_at": "2022-08-12T04:29:54+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:36:50+00:00",
      "updated_at": "2022-08-12T04:36:50+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:43:29+00:00",
      "updated_at": "2022-08-12T04:43:29+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:46:27+00:00",
      "updated_at": "2022-08-12T04:46:27+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-12T04:49:35+00:00",
      "updated_at": "2022-08-12T04:49:35+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-01-29T13:12:05+00:00",
      "updated_at": "2023-01-29T13:12:05+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-01-30T11:50:11+00:00",
      "updated_at": "2023-01-30T11:50:11+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-03-07T11:46:13+00:00",
      "updated_at": "2023-03-07T11:46:13+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-04-21T09:38:45+00:00",
      "updated_at": "2023-04-21T09:38:45+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-04-22T09:34:59+00:00",
      "updated_at": "2023-04-22T09:34:59+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a5b65fa19277cbd064644e530c5df1af4c84196b9a2050dbc0073cfa19a9f78c",
        "name": "linux-doc",
        "version": "4.15.0-191.202",
        "filename": "linux-doc_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-05-29T10:17:46+00:00",
      "updated_at": "2023-05-29T10:17:46+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-06-22T22:02:04+00:00",
  "updated_at": "2022-06-29T02:08:26+00:00",
  "deleted_at": null
}