268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f
213b68645fff000b67856a4d46759d35b66f151a
40b31a7c8d7dcccf27fdbc617d029e86
5.4.0-128.144
linux-libc-dev_5.4.0-128.144_amd64.deb
6107
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-42720 | 78 | USN | linux-libc-dev 5.4.0-131.147 |
CVE-2022-42721 | 55 | USN | linux-libc-dev 5.4.0-131.147 |
CVE-2022-41674 | 81 | USN | linux-libc-dev 5.4.0-131.147 |
CVE-2022-2602 | 0 | USN | linux-libc-dev 5.4.0-131.147 |
CVE-2022-39188 | 47 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3635 | 7 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-29901 | 0 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-2978 | 78 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-2153 | 55 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-41222 | 47 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-42703 | 55 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-20422 | 70 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3028 | 70 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3625 | 8 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-42719 | 88 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-40768 | 55 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3633 | 3 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3629 | 3 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2023-1095 | 6 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2023-2513 | 7 | USN | linux-libc-dev 5.4.0-132.148 |
{ "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f", "sha1": "213b68645fff000b67856a4d46759d35b66f151a", "md5": "40b31a7c8d7dcccf27fdbc617d029e86", "type": "DEB", "arch": "AMD64", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb", "size": 6107, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.4.0-128.144", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-42720", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "fcefbe13018692bbb523d681c7139214572f6b0b57c0aab44ffedc84ddac8039", "name": "linux-libc-dev", "version": "5.4.0-131.147", "filename": "linux-libc-dev_5.4.0-131.147_amd64.deb" }, "created_at": "2022-10-20T17:07:54+00:00", "updated_at": "2022-10-20T17:07:54+00:00" }, { "name": "CVE-2022-42721", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "fcefbe13018692bbb523d681c7139214572f6b0b57c0aab44ffedc84ddac8039", "name": "linux-libc-dev", "version": "5.4.0-131.147", "filename": "linux-libc-dev_5.4.0-131.147_amd64.deb" }, "created_at": "2022-10-20T18:10:32+00:00", "updated_at": "2022-10-20T18:10:32+00:00" }, { "name": "CVE-2022-41674", "risk": 81, "source": "USN", "sid": null, "fixed": { "sha256": "fcefbe13018692bbb523d681c7139214572f6b0b57c0aab44ffedc84ddac8039", "name": "linux-libc-dev", "version": "5.4.0-131.147", "filename": "linux-libc-dev_5.4.0-131.147_amd64.deb" }, "created_at": "2022-10-20T18:33:10+00:00", "updated_at": "2022-10-20T18:33:10+00:00" }, { "name": "CVE-2022-2602", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "fcefbe13018692bbb523d681c7139214572f6b0b57c0aab44ffedc84ddac8039", "name": "linux-libc-dev", "version": "5.4.0-131.147", "filename": "linux-libc-dev_5.4.0-131.147_amd64.deb" }, "created_at": "2022-10-20T19:23:30+00:00", "updated_at": "2022-10-20T19:23:30+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T10:37:00+00:00", "updated_at": "2022-11-17T10:37:00+00:00" }, { "name": "CVE-2022-3635", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T10:41:56+00:00", "updated_at": "2022-11-17T10:41:56+00:00" }, { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T10:48:44+00:00", "updated_at": "2022-11-17T10:48:44+00:00" }, { "name": "CVE-2022-2978", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:02:33+00:00", "updated_at": "2022-11-17T11:02:33+00:00" }, { "name": "CVE-2022-2153", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:03+00:00", "updated_at": "2022-11-17T11:03:03+00:00" }, { "name": "CVE-2022-41222", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:23+00:00", "updated_at": "2022-11-17T11:03:23+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:35+00:00", "updated_at": "2022-11-17T11:03:35+00:00" }, { "name": "CVE-2022-20422", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:51+00:00", "updated_at": "2022-11-17T11:03:51+00:00" }, { "name": "CVE-2022-3028", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:04:25+00:00", "updated_at": "2022-11-17T11:04:25+00:00" }, { "name": "CVE-2022-3625", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:07:45+00:00", "updated_at": "2022-11-17T11:07:45+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:08:05+00:00", "updated_at": "2022-11-17T11:08:05+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:08:53+00:00", "updated_at": "2022-11-17T11:08:53+00:00" }, { "name": "CVE-2022-3633", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-04-21T09:27:37+00:00", "updated_at": "2023-04-21T09:27:37+00:00" }, { "name": "CVE-2022-3629", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-04-21T09:28:17+00:00", "updated_at": "2023-04-21T09:28:17+00:00" }, { "name": "CVE-2023-1095", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-04-21T09:30:56+00:00", "updated_at": "2023-04-21T09:30:56+00:00" }, { "name": "CVE-2023-2513", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-06-06T10:18:42+00:00", "updated_at": "2023-06-06T10:18:42+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-09-22T10:14:13+00:00", "updated_at": "2022-09-23T16:58:51+00:00", "deleted_at": null }