Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (5)

linux-libc-dev

Hashes
Linux Kernel Headers for development This package provides headers from the Linux kernel. These headers are used by the installed headers for GNU glibc and other system libraries. They are NOT meant to be used to build third-party modules for your kernel. Use linux-headers-* packages for that.
  • SHA256: 20c2c5cf73c2463eda9e3a42a49c6f65c35ddc90a45d1fe0756d6005b52af229
  • SHA1: f87698852f8e813315953665fc305c1bb86ba291
  • MD5: 8476e8cbbf2aaa38c6932d4ab0f8965c
Information
  • Version: 4.4.0-139.165
  • Filename: linux-libc-dev_4.4.0-139.165_i386.deb
  • Size: 4477
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>

Vulnerabilities

NameRiskSourceFixed
CVE-2017-1817498USN
USN-3848-2
CVE-2018-1871055USN
linux-libc-dev
4.4.0-141.167
CVE-2018-1869055USN
linux-libc-dev
4.4.0-141.167
CVE-2018-1289655USN
linux-libc-dev
4.4.0-141.167
CVE-2017-1817498USN
linux-libc-dev
4.4.0-141.167

Raw Object

{
  "sha256": "20c2c5cf73c2463eda9e3a42a49c6f65c35ddc90a45d1fe0756d6005b52af229",
  "sha1": "f87698852f8e813315953665fc305c1bb86ba291",
  "md5": "8476e8cbbf2aaa38c6932d4ab0f8965c",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-libc-dev",
  "filename": "linux-libc-dev_4.4.0-139.165_i386.deb",
  "size": 4477,
  "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel.  These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.",
  "url": null,
  "version": "4.4.0-139.165",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": null,
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2017-18174",
      "risk": 98,
      "source": "USN",
      "sid": "USN-3848-2",
      "fixed": null,
      "created_at": "2021-03-20T19:29:50+00:00",
      "updated_at": "2021-03-20T19:29:50+00:00"
    },
    {
      "name": "CVE-2018-18710",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "dea04b05c923194a417a7b8df58b720af8ed139249db47b98faa0da880050157",
        "name": "linux-libc-dev",
        "version": "4.4.0-141.167",
        "filename": "linux-libc-dev_4.4.0-141.167_i386.deb"
      },
      "created_at": "2021-03-22T06:53:04+00:00",
      "updated_at": "2021-06-29T22:31:57+00:00"
    },
    {
      "name": "CVE-2018-18690",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "dea04b05c923194a417a7b8df58b720af8ed139249db47b98faa0da880050157",
        "name": "linux-libc-dev",
        "version": "4.4.0-141.167",
        "filename": "linux-libc-dev_4.4.0-141.167_i386.deb"
      },
      "created_at": "2021-03-22T05:53:13+00:00",
      "updated_at": "2021-06-30T00:36:08+00:00"
    },
    {
      "name": "CVE-2018-12896",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "dea04b05c923194a417a7b8df58b720af8ed139249db47b98faa0da880050157",
        "name": "linux-libc-dev",
        "version": "4.4.0-141.167",
        "filename": "linux-libc-dev_4.4.0-141.167_i386.deb"
      },
      "created_at": "2021-03-22T05:50:54+00:00",
      "updated_at": "2021-06-30T02:07:16+00:00"
    },
    {
      "name": "CVE-2017-18174",
      "risk": 98,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "dea04b05c923194a417a7b8df58b720af8ed139249db47b98faa0da880050157",
        "name": "linux-libc-dev",
        "version": "4.4.0-141.167",
        "filename": "linux-libc-dev_4.4.0-141.167_i386.deb"
      },
      "created_at": "2021-03-21T11:36:21+00:00",
      "updated_at": "2021-06-30T03:42:21+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2018-10-24T16:02:17+00:00",
  "updated_at": "2021-03-20T16:21:26+00:00",
  "deleted_at": null
}