113044ef637dc9df0f06b35c1bd504b6f5f833f3b9d9fdd4551871ba28b7b43f
c6c15da2fa6499797a0dc275b6a3545d9fac249c
e32d82c29c689482d94282b99a8bd414
5.10.158-2
linux-headers-5.10.0-20-amd64_5.10.158-2_amd64.deb
5581
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-5.10.0-20-common (= 5.10.158-2), linux-kbuild-5.10 (>= 5.10.158-2), linux-compiler-gcc-10-x86
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
{ "sha256": "113044ef637dc9df0f06b35c1bd504b6f5f833f3b9d9fdd4551871ba28b7b43f", "sha1": "c6c15da2fa6499797a0dc275b6a3545d9fac249c", "md5": "e32d82c29c689482d94282b99a8bd414", "type": "DEB", "arch": "AMD64", "name": "linux-headers-5.10.0-20-amd64", "filename": "linux-headers-5.10.0-20-amd64_5.10.158-2_amd64.deb", "size": 5581, "description": "Header files for Linux 5.10.0-20-amd64\nThis package provides the architecture-specific kernel header files for\nLinux kernel 5.10.0-20-amd64, generally used for building out-of-tree\nkernel modules. These files are going to be installed into\n/usr/src/linux-headers-5.10.0-20-amd64, and can be used for building\nmodules that load into the kernel provided by the\nlinux-image-5.10.0-20-amd64 package.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-5.10.0-20-common (= 5.10.158-2), linux-kbuild-5.10 (>= 5.10.158-2), linux-compiler-gcc-10-x86", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:33+00:00", "updated_at": "2023-01-25T10:38:33+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:37+00:00", "updated_at": "2023-01-25T10:38:37+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:43+00:00", "updated_at": "2023-01-25T10:38:43+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:44+00:00", "updated_at": "2023-01-25T10:38:44+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T06:13:44+00:00", "updated_at": "2022-12-16T10:14:47+00:00", "deleted_at": null }