2f12e1703335d96239c9b722f76925e5f399f88cd956923fcabd5b7a39c6a827
066a3882bb15d2df98c7defb024c87ad1735f222
34b473cf337877a46d3f68a6686d7dcf
5.4.0-109.123
linux-libc-dev_5.4.0-109.123_amd64.deb
6053
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-26490 | 78 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-20008 | 46 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-1016 | 0 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-25375 | 55 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2020-27820 | 47 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2021-26401 | 56 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-27223 | 88 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-25258 | 0 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-0487 | 55 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-20009 | 72 | USN | linux-libc-dev 5.4.0-110.124 |
CVE-2022-2964 | 78 | USN | linux-libc-dev 5.4.0-110.124 |
{ "sha256": "2f12e1703335d96239c9b722f76925e5f399f88cd956923fcabd5b7a39c6a827", "sha1": "066a3882bb15d2df98c7defb024c87ad1735f222", "md5": "34b473cf337877a46d3f68a6686d7dcf", "type": "DEB", "arch": "AMD64", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.4.0-109.123_amd64.deb", "size": 6053, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.4.0-109.123", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-26490", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T02:31:02+00:00", "updated_at": "2022-05-13T02:31:02+00:00" }, { "name": "CVE-2022-20008", "risk": 46, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T02:35:21+00:00", "updated_at": "2022-05-13T02:35:21+00:00" }, { "name": "CVE-2022-1016", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T02:36:22+00:00", "updated_at": "2022-05-13T02:36:22+00:00" }, { "name": "CVE-2022-25375", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T02:44:36+00:00", "updated_at": "2022-05-13T02:44:36+00:00" }, { "name": "CVE-2020-27820", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T02:45:52+00:00", "updated_at": "2022-05-13T02:45:52+00:00" }, { "name": "CVE-2021-26401", "risk": 56, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T02:50:15+00:00", "updated_at": "2022-05-13T02:50:15+00:00" }, { "name": "CVE-2022-27223", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T02:51:41+00:00", "updated_at": "2022-05-13T02:51:41+00:00" }, { "name": "CVE-2022-25258", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-05-13T03:13:43+00:00", "updated_at": "2022-05-13T03:13:43+00:00" }, { "name": "CVE-2022-0487", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-07-14T02:49:29+00:00", "updated_at": "2022-07-14T02:49:29+00:00" }, { "name": "CVE-2022-20009", "risk": 72, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2022-07-14T02:56:56+00:00", "updated_at": "2022-07-14T02:56:56+00:00" }, { "name": "CVE-2022-2964", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "f11ec36e7267de82fa1262056606e0b8d5d02e0bcadb85c488311405ce08dc66", "name": "linux-libc-dev", "version": "5.4.0-110.124", "filename": "linux-libc-dev_5.4.0-110.124_amd64.deb" }, "created_at": "2023-01-28T18:24:52+00:00", "updated_at": "2023-01-28T18:24:52+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-04-08T11:23:08+00:00", "updated_at": "2022-04-12T01:19:24+00:00", "deleted_at": null }