Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (30)

linux-image-unsigned-4.15.0-201-lowlatency

Hashes
Linux kernel image for version 4.15.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 4.15.0 on 64 bit x86 SMP. Supports Lowlatency processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-lowlatency meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 560091316f9e4822c2c71a81720ca11486f2e1f1060726e33ebb840b65b79abf
  • SHA1: da7b6e0fbd2c441561675007195fc1b0f3874eed
  • MD5: 8c3048a9a427719a86d46f5f32f2edb1
Information
  • Version: 4.15.0-201.212
  • Filename: linux-image-unsigned-4.15.0-201-lowlatency_4.15.0-201.212_amd64.deb
  • Size: 9021
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-201-lowlatency

Vulnerabilities

NameRiskSourceFixed
CVE-2022-428969USN
linux-tools-common
4.15.0-202.213
CVE-2022-356671USN
linux-tools-common
4.15.0-200.211
CVE-2022-352475USN
linux-tools-common
4.15.0-200.211
CVE-2022-364310USN
linux-tools-common
4.15.0-202.213
CVE-2022-4270355USN
linux-tools-common
4.15.0-200.211
CVE-2022-359475USN
linux-tools-common
4.15.0-200.211
CVE-2022-439458USN
linux-tools-common
4.15.0-202.213
CVE-2022-356580USN
linux-tools-common
4.15.0-200.211
CVE-2022-356480USN
linux-tools-common
4.15.0-200.211
CVE-2022-36218USN
linux-tools-common
4.15.0-200.211
CVE-2022-323978USN
linux-tools-common
4.15.0-200.211
CVE-2022-359475USN
linux-doc
4.15.0-200.211
CVE-2022-4270355USN
linux-doc
4.15.0-200.211
CVE-2022-356671USN
linux-doc
4.15.0-200.211
CVE-2022-356480USN
linux-doc
4.15.0-200.211
CVE-2022-356771USN
linux-doc
4.15.0-200.211
CVE-2022-36218USN
linux-doc
4.15.0-200.211
CVE-2022-352475USN
linux-doc
4.15.0-200.211
CVE-2022-356580USN
linux-doc
4.15.0-200.211
CVE-2022-323978USN
linux-doc
4.15.0-200.211
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-doc
4.15.0-202.213
CVE-2022-459348USN
linux-doc
4.15.0-202.213
CVE-2022-428969USN
linux-doc
4.15.0-202.213
CVE-2022-364310USN
linux-doc
4.15.0-202.213
CVE-2022-459348USN
linux-tools-common
4.15.0-202.213
CVE-2022-356771USN
linux-tools-common
4.15.0-200.211

Raw Object

{
  "sha256": "560091316f9e4822c2c71a81720ca11486f2e1f1060726e33ebb840b65b79abf",
  "sha1": "da7b6e0fbd2c441561675007195fc1b0f3874eed",
  "md5": "8c3048a9a427719a86d46f5f32f2edb1",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-4.15.0-201-lowlatency",
  "filename": "linux-image-unsigned-4.15.0-201-lowlatency_4.15.0-201.212_amd64.deb",
  "size": 9021,
  "description": "Linux kernel image for version 4.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 4.15.0 on\n64 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "4.15.0-201.212",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-201-lowlatency",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-28T14:06:19+00:00",
      "updated_at": "2023-06-28T14:06:19+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T10:49:11+00:00",
      "updated_at": "2023-06-28T10:49:11+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T12:12:46+00:00",
      "updated_at": "2023-06-28T12:12:46+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-28T14:52:37+00:00",
      "updated_at": "2023-06-28T14:52:37+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T15:06:58+00:00",
      "updated_at": "2023-06-28T15:06:58+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T17:02:17+00:00",
      "updated_at": "2023-06-28T17:02:17+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-28T23:31:47+00:00",
      "updated_at": "2023-06-28T23:31:47+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T02:37:15+00:00",
      "updated_at": "2023-06-29T02:37:15+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T05:13:00+00:00",
      "updated_at": "2023-06-29T05:13:00+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T07:32:18+00:00",
      "updated_at": "2023-06-29T07:32:18+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T08:25:31+00:00",
      "updated_at": "2023-06-29T08:25:31+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:23:21+00:00",
      "updated_at": "2022-12-02T12:23:21+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:39:35+00:00",
      "updated_at": "2022-12-02T12:39:35+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:41:28+00:00",
      "updated_at": "2022-12-02T12:41:28+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:12+00:00",
      "updated_at": "2022-12-02T12:42:12+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:43:00+00:00",
      "updated_at": "2022-12-02T12:43:00+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:44:06+00:00",
      "updated_at": "2022-12-02T12:44:06+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:45:29+00:00",
      "updated_at": "2022-12-02T12:45:29+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:12+00:00",
      "updated_at": "2022-12-02T12:46:12+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:51+00:00",
      "updated_at": "2022-12-02T12:46:51+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:43:12+00:00",
      "updated_at": "2023-01-13T10:43:12+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:37+00:00",
      "updated_at": "2023-01-13T10:52:37+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:02+00:00",
      "updated_at": "2023-01-13T10:53:02+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:06+00:00",
      "updated_at": "2023-01-13T10:55:06+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:24:53+00:00",
      "updated_at": "2023-01-14T10:24:53+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:00+00:00",
      "updated_at": "2023-01-14T10:26:00+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:16+00:00",
      "updated_at": "2023-01-14T10:26:16+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:37+00:00",
      "updated_at": "2023-01-14T10:26:37+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-29T15:42:20+00:00",
      "updated_at": "2023-06-29T15:42:20+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T21:02:36+00:00",
      "updated_at": "2023-06-29T21:02:36+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-28T13:20:18+00:00",
  "updated_at": "2022-12-02T11:05:06+00:00",
  "deleted_at": null
}