Raw Object
{
"sha256": "06972d734afb3e1f615be8a79231ff08757cb5e9d42f5ec58dd0306413aa5b9c",
"sha1": "86a84c68fc7df8ad0f55da79bd9d83a66f5f9037",
"md5": "b7396d907d5cd8bac1819ce4ca711776",
"type": "DEB",
"arch": "I386",
"name": "linux-libc-dev",
"filename": "linux-libc-dev_5.15.0-46.49_i386.deb",
"size": 6523,
"description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.",
"url": null,
"version": "5.15.0-46.49",
"source": "linux",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": null,
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2021-33061",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T16:14:19+00:00",
"updated_at": "2022-09-16T16:14:19+00:00"
},
{
"name": "CVE-2022-1973",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T16:55:04+00:00",
"updated_at": "2022-09-16T16:55:04+00:00"
},
{
"name": "CVE-2022-1012",
"risk": 91,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T16:55:12+00:00",
"updated_at": "2022-09-16T16:55:12+00:00"
},
{
"name": "CVE-2022-1852",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T16:55:22+00:00",
"updated_at": "2022-09-16T16:55:22+00:00"
},
{
"name": "CVE-2022-1729",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T17:06:54+00:00",
"updated_at": "2022-09-16T17:06:54+00:00"
},
{
"name": "CVE-2022-2503",
"risk": 67,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T17:07:30+00:00",
"updated_at": "2022-09-16T17:07:30+00:00"
},
{
"name": "CVE-2022-1943",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T17:11:12+00:00",
"updated_at": "2022-09-16T17:11:12+00:00"
},
{
"name": "CVE-2022-2873",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T17:12:47+00:00",
"updated_at": "2022-09-16T17:12:47+00:00"
},
{
"name": "CVE-2022-2959",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2022-09-16T17:12:59+00:00",
"updated_at": "2022-09-16T17:12:59+00:00"
},
{
"name": "CVE-2022-42720",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744",
"name": "linux-libc-dev",
"version": "5.15.0-52.58",
"filename": "linux-libc-dev_5.15.0-52.58_i386.deb"
},
"created_at": "2022-10-20T17:09:58+00:00",
"updated_at": "2022-10-20T17:09:58+00:00"
},
{
"name": "CVE-2022-42719",
"risk": 88,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744",
"name": "linux-libc-dev",
"version": "5.15.0-52.58",
"filename": "linux-libc-dev_5.15.0-52.58_i386.deb"
},
"created_at": "2022-10-20T17:25:04+00:00",
"updated_at": "2022-10-20T17:25:04+00:00"
},
{
"name": "CVE-2022-42721",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744",
"name": "linux-libc-dev",
"version": "5.15.0-52.58",
"filename": "linux-libc-dev_5.15.0-52.58_i386.deb"
},
"created_at": "2022-10-20T18:10:38+00:00",
"updated_at": "2022-10-20T18:10:38+00:00"
},
{
"name": "CVE-2022-41674",
"risk": 81,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744",
"name": "linux-libc-dev",
"version": "5.15.0-52.58",
"filename": "linux-libc-dev_5.15.0-52.58_i386.deb"
},
"created_at": "2022-10-20T18:33:15+00:00",
"updated_at": "2022-10-20T18:33:15+00:00"
},
{
"name": "CVE-2022-42722",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744",
"name": "linux-libc-dev",
"version": "5.15.0-52.58",
"filename": "linux-libc-dev_5.15.0-52.58_i386.deb"
},
"created_at": "2022-10-20T18:46:21+00:00",
"updated_at": "2022-10-20T18:46:21+00:00"
},
{
"name": "CVE-2022-2602",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744",
"name": "linux-libc-dev",
"version": "5.15.0-52.58",
"filename": "linux-libc-dev_5.15.0-52.58_i386.deb"
},
"created_at": "2022-10-20T19:23:36+00:00",
"updated_at": "2022-10-20T19:23:36+00:00"
},
{
"name": "CVE-2022-32296",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-01-28T17:42:55+00:00",
"updated_at": "2023-01-28T17:42:55+00:00"
},
{
"name": "CVE-2022-3077",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-01-28T22:58:49+00:00",
"updated_at": "2023-01-28T22:58:49+00:00"
},
{
"name": "CVE-2022-3577",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-01-29T16:10:29+00:00",
"updated_at": "2023-01-29T16:10:29+00:00"
},
{
"name": "CVE-2022-20572",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-03-07T11:46:23+00:00",
"updated_at": "2023-03-07T11:46:23+00:00"
},
{
"name": "CVE-2022-3115",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-03-07T12:09:18+00:00",
"updated_at": "2023-03-07T12:09:18+00:00"
},
{
"name": "CVE-2023-1838",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-04-21T09:27:13+00:00",
"updated_at": "2023-04-21T09:27:13+00:00"
},
{
"name": "CVE-2022-1974",
"risk": 41,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-04-21T09:33:02+00:00",
"updated_at": "2023-04-21T09:33:02+00:00"
},
{
"name": "CVE-2023-4387",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-09-13T09:51:00+00:00",
"updated_at": "2023-09-13T09:51:00+00:00"
},
{
"name": "CVE-2023-4459",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-09-13T10:29:06+00:00",
"updated_at": "2023-09-13T10:29:06+00:00"
},
{
"name": "CVE-2023-4385",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1",
"name": "linux-libc-dev",
"version": "5.15.0-47.51",
"filename": "linux-libc-dev_5.15.0-47.51_i386.deb"
},
"created_at": "2023-09-13T10:59:46+00:00",
"updated_at": "2023-09-13T10:59:46+00:00"
}
],
"risk": 91,
"vulnerable": 91,
"outdated": 91,
"malicious": 0,
"created_at": "2022-08-09T22:33:52+00:00",
"updated_at": "2022-08-10T03:08:44+00:00",
"deleted_at": null
}