Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (16)

linux-image-unsigned-4.15.0-200-lowlatency

Hashes
Linux kernel image for version 4.15.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 4.15.0 on 64 bit x86 SMP. Supports Lowlatency processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-lowlatency meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 6151fc0bbb37276c2421cb6fc2d45e8098d7912e0f00946ba58c25611992567d
  • SHA1: d4919ca63f63fd6ef6ae8bb159f86698c5e8c194
  • MD5: 83725e0eebedfd79c10f019f7669d630
Information
  • Version: 4.15.0-200.211
  • Filename: linux-image-unsigned-4.15.0-200-lowlatency_4.15.0-200.211_amd64.deb
  • Size: 9018
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-200-lowlatency

Vulnerabilities

NameRiskSourceFixed
CVE-2022-306155USN
linux-doc
4.15.0-201.212
CVE-2022-3918847USN
linux-doc
4.15.0-201.212
CVE-2022-358655USN
linux-doc
4.15.0-201.212
CVE-2021-415944USN
linux-doc
4.15.0-201.212
CVE-2022-2042178USN
linux-doc
4.15.0-201.212
CVE-2022-4030747USN
linux-doc
4.15.0-201.212
CVE-2022-40958USN
linux-doc
4.15.0-201.212
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-doc
4.15.0-202.213
CVE-2022-459348USN
linux-doc
4.15.0-202.213
CVE-2022-428969USN
linux-doc
4.15.0-202.213
CVE-2022-364310USN
linux-doc
4.15.0-202.213
CVE-2022-46620USN
linux-doc
4.15.0-201.212

Raw Object

{
  "sha256": "6151fc0bbb37276c2421cb6fc2d45e8098d7912e0f00946ba58c25611992567d",
  "sha1": "d4919ca63f63fd6ef6ae8bb159f86698c5e8c194",
  "md5": "83725e0eebedfd79c10f019f7669d630",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-4.15.0-200-lowlatency",
  "filename": "linux-image-unsigned-4.15.0-200-lowlatency_4.15.0-200.211_amd64.deb",
  "size": 9018,
  "description": "Linux kernel image for version 4.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 4.15.0 on\n64 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "4.15.0-200.211",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-200-lowlatency",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T13:00:56+00:00",
      "updated_at": "2023-01-07T13:00:56+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T13:43:52+00:00",
      "updated_at": "2023-01-07T13:43:52+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T14:23:03+00:00",
      "updated_at": "2023-01-07T14:23:03+00:00"
    },
    {
      "name": "CVE-2021-4159",
      "risk": 44,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T14:41:25+00:00",
      "updated_at": "2023-01-07T14:41:25+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T14:49:52+00:00",
      "updated_at": "2023-01-07T14:49:52+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T15:08:24+00:00",
      "updated_at": "2023-01-07T15:08:24+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T15:37:17+00:00",
      "updated_at": "2023-01-07T15:37:17+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:43:16+00:00",
      "updated_at": "2023-01-13T10:43:16+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:42+00:00",
      "updated_at": "2023-01-13T10:52:42+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:07+00:00",
      "updated_at": "2023-01-13T10:53:07+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:11+00:00",
      "updated_at": "2023-01-13T10:55:11+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:24:54+00:00",
      "updated_at": "2023-01-14T10:24:54+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:01+00:00",
      "updated_at": "2023-01-14T10:26:01+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:17+00:00",
      "updated_at": "2023-01-14T10:26:17+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:37+00:00",
      "updated_at": "2023-01-14T10:26:37+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7d1e862799cc831c17708bdc833ca564cc57d0c0eb82a724146e9860a2c3dd0a",
        "name": "linux-doc",
        "version": "4.15.0-201.212",
        "filename": "linux-doc_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-02-18T11:45:55+00:00",
      "updated_at": "2023-02-18T11:45:55+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-24T20:05:10+00:00",
  "updated_at": "2022-12-02T11:05:04+00:00",
  "deleted_at": null
}