075ca85982fbb1306f322c5ff7251a8e8aef433feb53bb7adb67a6ed64b6c9b2
c04ee4dbefdf24f7fc0922bb55b234a458e273cf
1a1bb6ec02a623a151c5948d4dfe4f8e
5.4.0-53.59
linux-libc-dev_5.4.0-53.59_i386.deb
5825
DEB
linux
I386
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-25284 | 41 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-14351 | 78 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-28915 | 61 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-10135 | 54 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-25211 | 60 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-25705 | 74 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-28097 | 59 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2021-0448 | 0 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-4788 | 47 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-0423 | 78 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-25645 | 75 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-36312 | 55 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-14390 | 56 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-25643 | 75 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2021-0605 | 49 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2021-39634 | 78 | USN | linux-libc-dev 5.4.0-56.62 |
CVE-2020-27784 | 0 | USN | linux-libc-dev 5.4.0-56.62 |
{ "sha256": "075ca85982fbb1306f322c5ff7251a8e8aef433feb53bb7adb67a6ed64b6c9b2", "sha1": "c04ee4dbefdf24f7fc0922bb55b234a458e273cf", "md5": "1a1bb6ec02a623a151c5948d4dfe4f8e", "type": "DEB", "arch": "I386", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.4.0-53.59_i386.deb", "size": 5825, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.4.0-53.59", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2020-25284", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-30T20:48:37+00:00", "updated_at": "2021-10-30T20:48:37+00:00" }, { "name": "CVE-2020-14351", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T01:21:18+00:00", "updated_at": "2021-10-31T01:21:18+00:00" }, { "name": "CVE-2020-28915", "risk": 61, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T02:02:30+00:00", "updated_at": "2021-10-31T02:02:30+00:00" }, { "name": "CVE-2020-10135", "risk": 54, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T06:24:15+00:00", "updated_at": "2021-10-31T06:24:15+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T09:36:46+00:00", "updated_at": "2021-10-31T09:36:46+00:00" }, { "name": "CVE-2020-25705", "risk": 74, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T12:52:55+00:00", "updated_at": "2021-10-31T12:52:55+00:00" }, { "name": "CVE-2020-28097", "risk": 59, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T15:44:26+00:00", "updated_at": "2021-10-31T15:44:26+00:00" }, { "name": "CVE-2021-0448", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T20:08:55+00:00", "updated_at": "2021-10-31T20:08:55+00:00" }, { "name": "CVE-2020-4788", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T21:08:32+00:00", "updated_at": "2021-10-31T21:08:32+00:00" }, { "name": "CVE-2020-0423", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T22:34:12+00:00", "updated_at": "2021-10-31T22:34:12+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T22:58:53+00:00", "updated_at": "2021-10-31T22:58:53+00:00" }, { "name": "CVE-2020-36312", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T23:06:24+00:00", "updated_at": "2021-10-31T23:06:24+00:00" }, { "name": "CVE-2020-14390", "risk": 56, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-10-31T23:55:56+00:00", "updated_at": "2021-10-31T23:55:56+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-11-01T00:49:24+00:00", "updated_at": "2021-11-01T00:49:24+00:00" }, { "name": "CVE-2021-0605", "risk": 49, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2021-11-01T01:32:41+00:00", "updated_at": "2021-11-01T01:32:41+00:00" }, { "name": "CVE-2021-39634", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2022-01-23T05:43:46+00:00", "updated_at": "2022-01-23T05:43:46+00:00" }, { "name": "CVE-2020-27784", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d10b524e59ee2e82ad83a5e82e58c280ceede057d18bb7e06f1c8ea50bb50016", "name": "linux-libc-dev", "version": "5.4.0-56.62", "filename": "linux-libc-dev_5.4.0-56.62_i386.deb" }, "created_at": "2023-01-29T16:48:20+00:00", "updated_at": "2023-01-29T16:48:20+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2020-10-21T09:37:11+00:00", "updated_at": "2021-10-30T09:13:49+00:00", "deleted_at": null }