Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (26)

linux-tools-4.15.0-201-lowlatency

Hashes
Linux kernel version specific tools for version 4.15.0-201 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.15.0-201 on 32 bit x86.
  • SHA256: 511c5ef1a25d62947b5935f0dcb3984320e9b06bc6faf572db20f989f288722d
  • SHA1: 088501c82e6c7f4db9088f6421b556ad3f6f6309
  • MD5: 9ff8d807233e609b9622b9d1d1216d3b
Information
  • Version: 4.15.0-201.212
  • Filename: linux-tools-4.15.0-201-lowlatency_4.15.0-201.212_i386.deb
  • Size: 710
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: linux-tools-4.15.0-201

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-4270355USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356671USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356480USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356771USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-36218USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-352475USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356580USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-323978USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-323978USN
linux-libc-dev
4.15.0-200.211
CVE-2022-352475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-4270355USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356580USN
linux-libc-dev
4.15.0-200.211
CVE-2022-36218USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356771USN
linux-libc-dev
4.15.0-200.211
CVE-2022-359475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356671USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356480USN
linux-libc-dev
4.15.0-200.211
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-libc-dev
4.15.0-202.213
CVE-2022-459348USN
linux-libc-dev
4.15.0-202.213
CVE-2022-428969USN
linux-libc-dev
4.15.0-202.213
CVE-2022-364310USN
linux-libc-dev
4.15.0-202.213

Raw Object

{
  "sha256": "511c5ef1a25d62947b5935f0dcb3984320e9b06bc6faf572db20f989f288722d",
  "sha1": "088501c82e6c7f4db9088f6421b556ad3f6f6309",
  "md5": "9ff8d807233e609b9622b9d1d1216d3b",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-tools-4.15.0-201-lowlatency",
  "filename": "linux-tools-4.15.0-201-lowlatency_4.15.0-201.212_i386.deb",
  "size": 710,
  "description": "Linux kernel version specific tools for version 4.15.0-201\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-201 on\n32 bit x86.",
  "url": null,
  "version": "4.15.0-201.212",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "linux-tools-4.15.0-201",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:23:22+00:00",
      "updated_at": "2022-12-02T12:23:22+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:39:36+00:00",
      "updated_at": "2022-12-02T12:39:36+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:41:29+00:00",
      "updated_at": "2022-12-02T12:41:29+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:13+00:00",
      "updated_at": "2022-12-02T12:42:13+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:43:01+00:00",
      "updated_at": "2022-12-02T12:43:01+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:44:08+00:00",
      "updated_at": "2022-12-02T12:44:08+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:45:30+00:00",
      "updated_at": "2022-12-02T12:45:30+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:13+00:00",
      "updated_at": "2022-12-02T12:46:13+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:52+00:00",
      "updated_at": "2022-12-02T12:46:52+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:37:39+00:00",
      "updated_at": "2022-12-03T12:37:39+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:38:49+00:00",
      "updated_at": "2022-12-03T12:38:49+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:40:51+00:00",
      "updated_at": "2022-12-03T12:40:51+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:41:31+00:00",
      "updated_at": "2022-12-03T12:41:31+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:42:37+00:00",
      "updated_at": "2022-12-03T12:42:37+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:43:12+00:00",
      "updated_at": "2022-12-03T12:43:12+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:44:08+00:00",
      "updated_at": "2022-12-03T12:44:08+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:44:53+00:00",
      "updated_at": "2022-12-03T12:44:53+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
      },
      "created_at": "2022-12-03T12:45:29+00:00",
      "updated_at": "2022-12-03T12:45:29+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:43:12+00:00",
      "updated_at": "2023-01-13T10:43:12+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:38+00:00",
      "updated_at": "2023-01-13T10:52:38+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:03+00:00",
      "updated_at": "2023-01-13T10:53:03+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:07+00:00",
      "updated_at": "2023-01-13T10:55:07+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
      },
      "created_at": "2023-01-14T10:24:52+00:00",
      "updated_at": "2023-01-14T10:24:52+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
      },
      "created_at": "2023-01-14T10:25:59+00:00",
      "updated_at": "2023-01-14T10:25:59+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
      },
      "created_at": "2023-01-14T10:26:14+00:00",
      "updated_at": "2023-01-14T10:26:14+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
      },
      "created_at": "2023-01-14T10:26:35+00:00",
      "updated_at": "2023-01-14T10:26:35+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-28T16:48:15+00:00",
  "updated_at": "2022-12-02T11:18:46+00:00",
  "deleted_at": null
}