Raw Object
{
"sha256": "f1e0dfd8eec5cebc174605894fb63e0fec7449e404c719d024a35fad28734e25",
"sha1": "a0fbb0159e2d2d895c88f6cf6015c19deacdf4be",
"md5": "cf66e119a1396943410df9b8b43a834a",
"type": "DEB",
"arch": "AMD64",
"name": "linux-tools-4.15.0-201-lowlatency",
"filename": "linux-tools-4.15.0-201-lowlatency_4.15.0-201.212_amd64.deb",
"size": 711,
"description": "Linux kernel version specific tools for version 4.15.0-201\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-201 on\n64 bit x86.",
"url": null,
"version": "4.15.0-201.212",
"source": "linux",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "linux-tools-4.15.0-201",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2022-3594",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:23:22+00:00",
"updated_at": "2022-12-02T12:23:22+00:00"
},
{
"name": "CVE-2022-42703",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:39:36+00:00",
"updated_at": "2022-12-02T12:39:36+00:00"
},
{
"name": "CVE-2022-3566",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:41:29+00:00",
"updated_at": "2022-12-02T12:41:29+00:00"
},
{
"name": "CVE-2022-3564",
"risk": 80,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:42:13+00:00",
"updated_at": "2022-12-02T12:42:13+00:00"
},
{
"name": "CVE-2022-3567",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:43:01+00:00",
"updated_at": "2022-12-02T12:43:01+00:00"
},
{
"name": "CVE-2022-3621",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:44:08+00:00",
"updated_at": "2022-12-02T12:44:08+00:00"
},
{
"name": "CVE-2022-3524",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:45:30+00:00",
"updated_at": "2022-12-02T12:45:30+00:00"
},
{
"name": "CVE-2022-3565",
"risk": 80,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:46:13+00:00",
"updated_at": "2022-12-02T12:46:13+00:00"
},
{
"name": "CVE-2022-3239",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
"name": "linux-source-4.15.0",
"version": "4.15.0-200.211",
"filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
},
"created_at": "2022-12-02T12:46:52+00:00",
"updated_at": "2022-12-02T12:46:52+00:00"
},
{
"name": "CVE-2022-3239",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:37:38+00:00",
"updated_at": "2022-12-03T12:37:38+00:00"
},
{
"name": "CVE-2022-3524",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:38:49+00:00",
"updated_at": "2022-12-03T12:38:49+00:00"
},
{
"name": "CVE-2022-42703",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:40:51+00:00",
"updated_at": "2022-12-03T12:40:51+00:00"
},
{
"name": "CVE-2022-3565",
"risk": 80,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:41:31+00:00",
"updated_at": "2022-12-03T12:41:31+00:00"
},
{
"name": "CVE-2022-3621",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:42:37+00:00",
"updated_at": "2022-12-03T12:42:37+00:00"
},
{
"name": "CVE-2022-3567",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:43:11+00:00",
"updated_at": "2022-12-03T12:43:11+00:00"
},
{
"name": "CVE-2022-3594",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:44:08+00:00",
"updated_at": "2022-12-03T12:44:08+00:00"
},
{
"name": "CVE-2022-3566",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:44:52+00:00",
"updated_at": "2022-12-03T12:44:52+00:00"
},
{
"name": "CVE-2022-3564",
"risk": 80,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e0ae93fd39c3cd9f2f4dbd9c6a49d9ff7bfe9eb5b435ba6ea05a0b2427ba7fff",
"name": "linux-libc-dev",
"version": "4.15.0-200.211",
"filename": "linux-libc-dev_4.15.0-200.211_i386.deb"
},
"created_at": "2022-12-03T12:45:29+00:00",
"updated_at": "2022-12-03T12:45:29+00:00"
},
{
"name": "CVE-2022-42896",
"risk": 9,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-01-13T10:43:12+00:00",
"updated_at": "2023-01-13T10:43:12+00:00"
},
{
"name": "CVE-2022-45934",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-01-13T10:52:38+00:00",
"updated_at": "2023-01-13T10:52:38+00:00"
},
{
"name": "CVE-2022-43945",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-01-13T10:53:03+00:00",
"updated_at": "2023-01-13T10:53:03+00:00"
},
{
"name": "CVE-2022-3643",
"risk": 10,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-01-13T10:55:07+00:00",
"updated_at": "2023-01-13T10:55:07+00:00"
},
{
"name": "CVE-2022-43945",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
"name": "linux-libc-dev",
"version": "4.15.0-202.213",
"filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
},
"created_at": "2023-01-14T10:24:52+00:00",
"updated_at": "2023-01-14T10:24:52+00:00"
},
{
"name": "CVE-2022-45934",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
"name": "linux-libc-dev",
"version": "4.15.0-202.213",
"filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
},
"created_at": "2023-01-14T10:25:59+00:00",
"updated_at": "2023-01-14T10:25:59+00:00"
},
{
"name": "CVE-2022-42896",
"risk": 9,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
"name": "linux-libc-dev",
"version": "4.15.0-202.213",
"filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
},
"created_at": "2023-01-14T10:26:14+00:00",
"updated_at": "2023-01-14T10:26:14+00:00"
},
{
"name": "CVE-2022-3643",
"risk": 10,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "e4cfe0157d453be12d87a1e33acbb38790e472ffce0d31279cc3b37c1e4a5a8a",
"name": "linux-libc-dev",
"version": "4.15.0-202.213",
"filename": "linux-libc-dev_4.15.0-202.213_i386.deb"
},
"created_at": "2023-01-14T10:26:35+00:00",
"updated_at": "2023-01-14T10:26:35+00:00"
}
],
"risk": 100,
"vulnerable": 100,
"outdated": 100,
"malicious": 0,
"created_at": "2022-11-28T13:20:18+00:00",
"updated_at": "2022-12-02T11:18:46+00:00",
"deleted_at": null
}