0bc512e807bfa32688a8bf246759a5e1f8d737035367811835f97ef763e8c3a8
ee81d3b6ca75a11a5cb0407410059130e57b4822
a690a7c6318c444014ac4155c943b28a
5.10.158-2
linux-doc-5.10_5.10.158-2_all.deb
163425
DEB
linux
ALL
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
{ "sha256": "0bc512e807bfa32688a8bf246759a5e1f8d737035367811835f97ef763e8c3a8", "sha1": "ee81d3b6ca75a11a5cb0407410059130e57b4822", "md5": "a690a7c6318c444014ac4155c943b28a", "type": "DEB", "arch": "ALL", "name": "linux-doc-5.10", "filename": "linux-doc-5.10_5.10.158-2_all.deb", "size": 163425, "description": "Linux kernel specific documentation for version 5.10\nThis package provides the various README files and HTML documentation for\nthe Linux kernel version 5.10. Plenty of information, including the\ndescriptions of various kernel subsystems, filesystems, driver-specific\nnotes and the like. An index to the documentation is installed as\n/usr/share/doc/linux-doc-5.10/html/index.html.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:33+00:00", "updated_at": "2023-01-25T10:38:33+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:37+00:00", "updated_at": "2023-01-25T10:38:37+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:44+00:00", "updated_at": "2023-01-25T10:38:44+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T03:05:48+00:00", "updated_at": "2022-12-16T10:14:35+00:00", "deleted_at": null }