Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (30)

linux-image-4.15.0-201-lowlatency

Hashes
Linux kernel image for version 4.15.0 on 32 bit x86 SMP This package contains the Linux kernel image for version 4.15.0 on 32 bit x86 SMP. Supports Lowlatency processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-lowlatency meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 83fe6631197271f235210cb88a464589bc64245035acdcc1125060b6aa796b3c
  • SHA1: 7563d7ded7768d1b5cd3d9a14903846e85a64087
  • MD5: 3f6352063fc0a36d02dd8fea5c8ff537
Information
  • Version: 4.15.0-201.212
  • Filename: linux-image-4.15.0-201-lowlatency_4.15.0-201.212_i386.deb
  • Size: 8269
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-201-lowlatency

Vulnerabilities

NameRiskSourceFixed
CVE-2022-356671USN
linux-tools-common
4.15.0-200.211
CVE-2022-352475USN
linux-tools-common
4.15.0-200.211
CVE-2022-428969USN
linux-tools-common
4.15.0-202.213
CVE-2022-364310USN
linux-tools-common
4.15.0-202.213
CVE-2022-4270355USN
linux-tools-common
4.15.0-200.211
CVE-2022-359475USN
linux-tools-common
4.15.0-200.211
CVE-2022-439458USN
linux-tools-common
4.15.0-202.213
CVE-2022-356580USN
linux-tools-common
4.15.0-200.211
CVE-2022-356480USN
linux-tools-common
4.15.0-200.211
CVE-2022-36218USN
linux-tools-common
4.15.0-200.211
CVE-2022-323978USN
linux-tools-common
4.15.0-200.211
CVE-2022-359475USN
linux-doc
4.15.0-200.211
CVE-2022-4270355USN
linux-doc
4.15.0-200.211
CVE-2022-356671USN
linux-doc
4.15.0-200.211
CVE-2022-356480USN
linux-doc
4.15.0-200.211
CVE-2022-356771USN
linux-doc
4.15.0-200.211
CVE-2022-36218USN
linux-doc
4.15.0-200.211
CVE-2022-352475USN
linux-doc
4.15.0-200.211
CVE-2022-356580USN
linux-doc
4.15.0-200.211
CVE-2022-323978USN
linux-doc
4.15.0-200.211
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-doc
4.15.0-202.213
CVE-2022-459348USN
linux-doc
4.15.0-202.213
CVE-2022-428969USN
linux-doc
4.15.0-202.213
CVE-2022-364310USN
linux-doc
4.15.0-202.213
CVE-2022-459348USN
linux-tools-common
4.15.0-202.213
CVE-2022-356771USN
linux-tools-common
4.15.0-200.211

Raw Object

{
  "sha256": "83fe6631197271f235210cb88a464589bc64245035acdcc1125060b6aa796b3c",
  "sha1": "7563d7ded7768d1b5cd3d9a14903846e85a64087",
  "md5": "3f6352063fc0a36d02dd8fea5c8ff537",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-image-4.15.0-201-lowlatency",
  "filename": "linux-image-4.15.0-201-lowlatency_4.15.0-201.212_i386.deb",
  "size": 8269,
  "description": "Linux kernel image for version 4.15.0 on 32 bit x86 SMP\nThis package contains the Linux kernel image for version 4.15.0 on\n32 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "4.15.0-201.212",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-201-lowlatency",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T10:49:10+00:00",
      "updated_at": "2023-06-28T10:49:10+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T12:12:46+00:00",
      "updated_at": "2023-06-28T12:12:46+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-28T14:06:18+00:00",
      "updated_at": "2023-06-28T14:06:18+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-28T14:52:37+00:00",
      "updated_at": "2023-06-28T14:52:37+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T15:06:57+00:00",
      "updated_at": "2023-06-28T15:06:57+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-28T17:02:16+00:00",
      "updated_at": "2023-06-28T17:02:16+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-28T23:31:46+00:00",
      "updated_at": "2023-06-28T23:31:46+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T02:37:15+00:00",
      "updated_at": "2023-06-29T02:37:15+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T05:12:59+00:00",
      "updated_at": "2023-06-29T05:12:59+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T07:32:17+00:00",
      "updated_at": "2023-06-29T07:32:17+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T08:25:30+00:00",
      "updated_at": "2023-06-29T08:25:30+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:23:21+00:00",
      "updated_at": "2022-12-02T12:23:21+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:39:35+00:00",
      "updated_at": "2022-12-02T12:39:35+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:41:27+00:00",
      "updated_at": "2022-12-02T12:41:27+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:12+00:00",
      "updated_at": "2022-12-02T12:42:12+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:59+00:00",
      "updated_at": "2022-12-02T12:42:59+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:44:06+00:00",
      "updated_at": "2022-12-02T12:44:06+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:45:29+00:00",
      "updated_at": "2022-12-02T12:45:29+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:11+00:00",
      "updated_at": "2022-12-02T12:46:11+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a2dcac66df61fab4f6c53e5f00edc73bc25ad1868c0a6dd3f0fcb9b3fe1e87e3",
        "name": "linux-doc",
        "version": "4.15.0-200.211",
        "filename": "linux-doc_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:51+00:00",
      "updated_at": "2022-12-02T12:46:51+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:43:11+00:00",
      "updated_at": "2023-01-13T10:43:11+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:37+00:00",
      "updated_at": "2023-01-13T10:52:37+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:02+00:00",
      "updated_at": "2023-01-13T10:53:02+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:06+00:00",
      "updated_at": "2023-01-13T10:55:06+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:24:53+00:00",
      "updated_at": "2023-01-14T10:24:53+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:00+00:00",
      "updated_at": "2023-01-14T10:26:00+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:15+00:00",
      "updated_at": "2023-01-14T10:26:15+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48fb217f954bbf795c51068e8c5dd44acb20a1019430990860e556b6510b1a1f",
        "name": "linux-doc",
        "version": "4.15.0-202.213",
        "filename": "linux-doc_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-01-14T10:26:36+00:00",
      "updated_at": "2023-01-14T10:26:36+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d35a90007e520eabf37208fd94af27f1ce092973a7e3f48267531d0c58756e72",
        "name": "linux-tools-common",
        "version": "4.15.0-202.213",
        "filename": "linux-tools-common_4.15.0-202.213_all.deb"
      },
      "created_at": "2023-06-29T15:42:19+00:00",
      "updated_at": "2023-06-29T15:42:19+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5e825b9a8089bd97e60370228389bf2442fd191001c1b6e39812ad2fa2417cea",
        "name": "linux-tools-common",
        "version": "4.15.0-200.211",
        "filename": "linux-tools-common_4.15.0-200.211_all.deb"
      },
      "created_at": "2023-06-29T21:02:36+00:00",
      "updated_at": "2023-06-29T21:02:36+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-28T16:48:15+00:00",
  "updated_at": "2022-12-02T11:05:01+00:00",
  "deleted_at": null
}