c04d01294fe89e71b38880848e745e902bb34ad1563129f12cb752e68e2d1c83
5f176f8367c7422ef64ce3f12ef2940f4cf48501
e1b0f555a2fabe37fee117e80ee401a4
4.15.0-192.203
linux-image-unsigned-4.15.0-192-generic_4.15.0-192.203_amd64.deb
8963
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-192-generic
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-36946 | 75 | USN | linux-libc-dev 4.15.0-193.204 |
CVE-2021-33655 | 78 | USN | linux-libc-dev 4.15.0-193.204 |
CVE-2021-33655 | 78 | USN | linux-tools-host 4.15.0-193.204 |
CVE-2022-36946 | 75 | USN | linux-tools-host 4.15.0-193.204 |
{ "sha256": "c04d01294fe89e71b38880848e745e902bb34ad1563129f12cb752e68e2d1c83", "sha1": "5f176f8367c7422ef64ce3f12ef2940f4cf48501", "md5": "e1b0f555a2fabe37fee117e80ee401a4", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-4.15.0-192-generic", "filename": "linux-image-unsigned-4.15.0-192-generic_4.15.0-192.203_amd64.deb", "size": 8963, "description": "Linux kernel image for version 4.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 4.15.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.15.0-192.203", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-192-generic", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "458d624ca34c6c9f93894a826c95d49932cda42df0950ddab2b479de73017ca2", "name": "linux-libc-dev", "version": "4.15.0-193.204", "filename": "linux-libc-dev_4.15.0-193.204_amd64.deb" }, "created_at": "2022-09-21T17:01:08+00:00", "updated_at": "2022-09-21T17:01:08+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "458d624ca34c6c9f93894a826c95d49932cda42df0950ddab2b479de73017ca2", "name": "linux-libc-dev", "version": "4.15.0-193.204", "filename": "linux-libc-dev_4.15.0-193.204_amd64.deb" }, "created_at": "2022-09-21T17:07:33+00:00", "updated_at": "2022-09-21T17:07:33+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "e24652ba640d984a84c74f61085b816a9a5a1938babffdda515996c9d321f9f7", "name": "linux-tools-host", "version": "4.15.0-193.204", "filename": "linux-tools-host_4.15.0-193.204_all.deb" }, "created_at": "2022-09-22T17:03:49+00:00", "updated_at": "2022-09-22T17:03:49+00:00" }, { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "e24652ba640d984a84c74f61085b816a9a5a1938babffdda515996c9d321f9f7", "name": "linux-tools-host", "version": "4.15.0-193.204", "filename": "linux-tools-host_4.15.0-193.204_all.deb" }, "created_at": "2022-09-22T17:11:50+00:00", "updated_at": "2022-09-22T17:11:50+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-08-10T19:37:10+00:00", "updated_at": "2022-08-12T03:23:02+00:00", "deleted_at": null }