008aae3fe562b6db7da4d57c2fa5971253468ed36bc052ab40079fdc10bf7e57
5b9e99c19eedc207ca4ce77591f8794f05662d81
76fecd18537c8977afe2c7e5cb8a3fb9
5.15.0-58.64
linux-headers-5.15.0-58_5.15.0-58.64_all.deb
75672
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
coreutils
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-3543 | 55 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-3623 | 8 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-3640 | 9 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-42895 | 6 | USN | linux-doc 5.15.0-60.66 |
CVE-2023-0590 | 5 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-3619 | 43 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-41850 | 47 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-47940 | 8 | USN | linux-doc 5.15.0-60.66 |
CVE-2022-41849 | 42 | USN | linux-doc 5.15.0-60.66 |
CVE-2023-22998 | 6 | USN | linux-doc 5.15.0-60.66 |
CVE-2023-1872 | 7 | USN | linux-doc 5.15.0-71.78 |
CVE-2023-1829 | 8 | USN | linux-doc 5.15.0-71.78 |
CVE-2022-1184 | 0 | USN | linux-doc 5.15.0-60.66 |
CVE-2023-3006 | 0 | USN | linux-doc 5.15.0-60.66 |
CVE-2023-3812 | 0 | USN | linux-doc 5.15.0-60.66 |
{ "sha256": "008aae3fe562b6db7da4d57c2fa5971253468ed36bc052ab40079fdc10bf7e57", "sha1": "5b9e99c19eedc207ca4ce77591f8794f05662d81", "md5": "76fecd18537c8977afe2c7e5cb8a3fb9", "type": "DEB", "arch": "ALL", "name": "linux-headers-5.15.0-58", "filename": "linux-headers-5.15.0-58_5.15.0-58.64_all.deb", "size": 75672, "description": "Header files related to Linux kernel version 5.15.0\nThis package provides kernel header files for version 5.15.0, for sites\nthat want the latest kernel headers. Please read\n/usr/share/doc/linux-headers-5.15.0-58/debian.README.gz for details", "url": null, "version": "5.15.0-58.64", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "coreutils", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:16:50+00:00", "updated_at": "2023-02-10T10:16:50+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:22:52+00:00", "updated_at": "2023-02-10T10:22:52+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:27:52+00:00", "updated_at": "2023-02-10T10:27:52+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:30:08+00:00", "updated_at": "2023-02-10T10:30:08+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:31:27+00:00", "updated_at": "2023-02-10T10:31:27+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:50+00:00", "updated_at": "2023-02-10T10:32:50+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:57+00:00", "updated_at": "2023-02-10T10:32:57+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:34:59+00:00", "updated_at": "2023-02-10T10:34:59+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:39:32+00:00", "updated_at": "2023-02-10T10:39:32+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:41:14+00:00", "updated_at": "2023-02-10T10:41:14+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-04-21T09:28:49+00:00", "updated_at": "2023-04-21T09:28:49+00:00" }, { "name": "CVE-2023-1872", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "b1a9a568c085705d63333ba223caf8b35cb0415b80dab379cff797c7a7639583", "name": "linux-doc", "version": "5.15.0-71.78", "filename": "linux-doc_5.15.0-71.78_all.deb" }, "created_at": "2023-04-28T22:46:09+00:00", "updated_at": "2023-04-28T22:46:09+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "b1a9a568c085705d63333ba223caf8b35cb0415b80dab379cff797c7a7639583", "name": "linux-doc", "version": "5.15.0-71.78", "filename": "linux-doc_5.15.0-71.78_all.deb" }, "created_at": "2023-04-29T07:29:11+00:00", "updated_at": "2023-04-29T07:29:11+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-06-06T10:06:14+00:00", "updated_at": "2023-06-06T10:06:14+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-07-12T10:06:59+00:00", "updated_at": "2023-07-12T10:06:59+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "523ddaa8742ac6cdbb1a0caccd8a6eeffd38acad5ce4a740ab8e7ac27a55c084", "name": "linux-doc", "version": "5.15.0-60.66", "filename": "linux-doc_5.15.0-60.66_all.deb" }, "created_at": "2023-08-09T09:33:00+00:00", "updated_at": "2023-08-09T09:33:00+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-05T13:03:23+00:00", "updated_at": "2023-01-14T10:13:39+00:00", "deleted_at": null }