Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (16)

linux-image-unsigned-4.15.0-189-lowlatency

Hashes
Linux kernel image for version 4.15.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 4.15.0 on 64 bit x86 SMP. Supports Lowlatency processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-lowlatency meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: dfaa12e1b62b857a818e40142361525df80853d5201e7f531579907c13815652
  • SHA1: 85b10b86c83f6c5cce9759893d20d6b23e239a54
  • MD5: 0f78a72b8193c92103452cce9da7511d
Information
  • Version: 4.15.0-189.200
  • Filename: linux-image-unsigned-4.15.0-189-lowlatency_4.15.0-189.200_amd64.deb
  • Size: 9005
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-189-lowlatency

Vulnerabilities

NameRiskSourceFixed
CVE-2022-339810USN
linux-libc-dev
4.15.0-191.202
CVE-2022-11950USN
linux-libc-dev
4.15.0-191.202
CVE-2022-25880USN
linux-libc-dev
4.15.0-191.202
CVE-2022-25860USN
linux-libc-dev
4.15.0-191.202
CVE-2022-197441USN
linux-libc-dev
4.15.0-191.202
CVE-2022-16790USN
linux-libc-dev
4.15.0-191.202
CVE-2022-17340USN
linux-libc-dev
4.15.0-191.202
CVE-2022-165278USN
linux-libc-dev
4.15.0-191.202
CVE-2022-04940USN
linux-libc-dev
4.15.0-191.202
CVE-2022-10480USN
linux-libc-dev
4.15.0-191.202
CVE-2022-349180USN
linux-libc-dev
4.15.0-191.202
CVE-2022-197555USN
linux-libc-dev
4.15.0-191.202
CVE-2022-172970USN
linux-libc-dev
4.15.0-191.202
CVE-2022-250367USN
linux-libc-dev
4.15.0-191.202
CVE-2022-205727USN
linux-libc-dev
4.15.0-191.202
CVE-2022-299167USN
linux-libc-dev
4.15.0-191.202

Raw Object

{
  "sha256": "dfaa12e1b62b857a818e40142361525df80853d5201e7f531579907c13815652",
  "sha1": "85b10b86c83f6c5cce9759893d20d6b23e239a54",
  "md5": "0f78a72b8193c92103452cce9da7511d",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-4.15.0-189-lowlatency",
  "filename": "linux-image-unsigned-4.15.0-189-lowlatency_4.15.0-189.200_amd64.deb",
  "size": 9005,
  "description": "Linux kernel image for version 4.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 4.15.0 on\n64 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "4.15.0-189.200",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-189-lowlatency",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T02:49:39+00:00",
      "updated_at": "2022-08-11T02:49:39+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:00:05+00:00",
      "updated_at": "2022-08-11T03:00:05+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:02:00+00:00",
      "updated_at": "2022-08-11T03:02:00+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:15:51+00:00",
      "updated_at": "2022-08-11T03:15:51+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:16:52+00:00",
      "updated_at": "2022-08-11T03:16:52+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:24:11+00:00",
      "updated_at": "2022-08-11T03:24:11+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:26:48+00:00",
      "updated_at": "2022-08-11T03:26:48+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:29:20+00:00",
      "updated_at": "2022-08-11T03:29:20+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:31:18+00:00",
      "updated_at": "2022-08-11T03:31:18+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:39:10+00:00",
      "updated_at": "2022-08-11T03:39:10+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:41:22+00:00",
      "updated_at": "2022-08-11T03:41:22+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:45:49+00:00",
      "updated_at": "2022-08-11T03:45:49+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2022-08-11T03:56:08+00:00",
      "updated_at": "2022-08-11T03:56:08+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2023-01-29T13:12:04+00:00",
      "updated_at": "2023-01-29T13:12:04+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2023-03-07T11:46:12+00:00",
      "updated_at": "2023-03-07T11:46:12+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f6e570efb297845d09c35a5ed086cdf2ddd8c592499d51877f565cb996cc5b97",
        "name": "linux-libc-dev",
        "version": "4.15.0-191.202",
        "filename": "linux-libc-dev_4.15.0-191.202_i386.deb"
      },
      "created_at": "2023-04-21T09:38:44+00:00",
      "updated_at": "2023-04-21T09:38:44+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-06-22T22:02:04+00:00",
  "updated_at": "2022-06-29T02:03:58+00:00",
  "deleted_at": null
}