a1ec1712295cf74d5435d742f4846ef708f65fe3422d4e628d90a21ea6c085b8
e23f2d3f175ba80526968ab55f8fd28b61304bce
b344cb9371fab509b0bb2cd848dd8801
4.15.0-192.203
linux-image-4.15.0-192-lowlatency_4.15.0-192.203_i386.deb
8254
DEB
linux
I386
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-192-lowlatency
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-36946 | 75 | USN | linux-libc-dev 4.15.0-193.204 |
CVE-2021-33655 | 78 | USN | linux-libc-dev 4.15.0-193.204 |
CVE-2021-33655 | 78 | USN | linux-tools-host 4.15.0-193.204 |
CVE-2022-36946 | 75 | USN | linux-tools-host 4.15.0-193.204 |
{ "sha256": "a1ec1712295cf74d5435d742f4846ef708f65fe3422d4e628d90a21ea6c085b8", "sha1": "e23f2d3f175ba80526968ab55f8fd28b61304bce", "md5": "b344cb9371fab509b0bb2cd848dd8801", "type": "DEB", "arch": "I386", "name": "linux-image-4.15.0-192-lowlatency", "filename": "linux-image-4.15.0-192-lowlatency_4.15.0-192.203_i386.deb", "size": 8254, "description": "Linux kernel image for version 4.15.0 on 32 bit x86 SMP\nThis package contains the Linux kernel image for version 4.15.0 on\n32 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.15.0-192.203", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-192-lowlatency", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "458d624ca34c6c9f93894a826c95d49932cda42df0950ddab2b479de73017ca2", "name": "linux-libc-dev", "version": "4.15.0-193.204", "filename": "linux-libc-dev_4.15.0-193.204_amd64.deb" }, "created_at": "2022-09-21T17:01:08+00:00", "updated_at": "2022-09-21T17:01:08+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "458d624ca34c6c9f93894a826c95d49932cda42df0950ddab2b479de73017ca2", "name": "linux-libc-dev", "version": "4.15.0-193.204", "filename": "linux-libc-dev_4.15.0-193.204_amd64.deb" }, "created_at": "2022-09-21T17:07:33+00:00", "updated_at": "2022-09-21T17:07:33+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "e24652ba640d984a84c74f61085b816a9a5a1938babffdda515996c9d321f9f7", "name": "linux-tools-host", "version": "4.15.0-193.204", "filename": "linux-tools-host_4.15.0-193.204_all.deb" }, "created_at": "2022-09-22T17:03:49+00:00", "updated_at": "2022-09-22T17:03:49+00:00" }, { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "e24652ba640d984a84c74f61085b816a9a5a1938babffdda515996c9d321f9f7", "name": "linux-tools-host", "version": "4.15.0-193.204", "filename": "linux-tools-host_4.15.0-193.204_all.deb" }, "created_at": "2022-09-22T17:11:50+00:00", "updated_at": "2022-09-22T17:11:50+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-08-10T19:33:09+00:00", "updated_at": "2022-08-12T03:23:07+00:00", "deleted_at": null }