Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (16)

linux-libc-dev

Hashes
Linux Kernel Headers for development This package provides headers from the Linux kernel. These headers are used by the installed headers for GNU glibc and other system libraries. They are NOT meant to be used to build third-party modules for your kernel. Use linux-headers-* packages for that.
  • SHA256: 3adbd34a9d992728ef61b1a1e6ba6a8b0a09bb351008f807c710ce58e4899a4e
  • SHA1: 147176c60f5a581d2a7c5d133fdb6b01401d43bf
  • MD5: 8f4c8b397ade400ed973a59ed587e94e
Information
  • Version: 5.4.0-131.147
  • Filename: linux-libc-dev_5.4.0-131.147_i386.deb
  • Size: 6107
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>

Vulnerabilities

NameRiskSourceFixed
CVE-2022-3918847USN
linux-libc-dev
5.4.0-132.148
CVE-2022-36357USN
linux-libc-dev
5.4.0-132.148
CVE-2022-299010USN
linux-libc-dev
5.4.0-132.148
CVE-2022-297878USN
linux-libc-dev
5.4.0-132.148
CVE-2022-215355USN
linux-libc-dev
5.4.0-132.148
CVE-2022-4122247USN
linux-libc-dev
5.4.0-132.148
CVE-2022-4270355USN
linux-libc-dev
5.4.0-132.148
CVE-2022-2042270USN
linux-libc-dev
5.4.0-132.148
CVE-2022-302870USN
linux-libc-dev
5.4.0-132.148
CVE-2022-36258USN
linux-libc-dev
5.4.0-132.148
CVE-2022-4271988USN
linux-libc-dev
5.4.0-132.148
CVE-2022-4076855USN
linux-libc-dev
5.4.0-132.148
CVE-2022-36333USN
linux-libc-dev
5.4.0-132.148
CVE-2022-36293USN
linux-libc-dev
5.4.0-132.148
CVE-2023-10956USN
linux-libc-dev
5.4.0-132.148
CVE-2023-25137USN
linux-libc-dev
5.4.0-132.148

Raw Object

{
  "sha256": "3adbd34a9d992728ef61b1a1e6ba6a8b0a09bb351008f807c710ce58e4899a4e",
  "sha1": "147176c60f5a581d2a7c5d133fdb6b01401d43bf",
  "md5": "8f4c8b397ade400ed973a59ed587e94e",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-libc-dev",
  "filename": "linux-libc-dev_5.4.0-131.147_i386.deb",
  "size": 6107,
  "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel.  These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.",
  "url": null,
  "version": "5.4.0-131.147",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": null,
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T10:37:03+00:00",
      "updated_at": "2022-11-17T10:37:03+00:00"
    },
    {
      "name": "CVE-2022-3635",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T10:41:59+00:00",
      "updated_at": "2022-11-17T10:41:59+00:00"
    },
    {
      "name": "CVE-2022-29901",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T10:48:45+00:00",
      "updated_at": "2022-11-17T10:48:45+00:00"
    },
    {
      "name": "CVE-2022-2978",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:02:36+00:00",
      "updated_at": "2022-11-17T11:02:36+00:00"
    },
    {
      "name": "CVE-2022-2153",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:03:06+00:00",
      "updated_at": "2022-11-17T11:03:06+00:00"
    },
    {
      "name": "CVE-2022-41222",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:03:26+00:00",
      "updated_at": "2022-11-17T11:03:26+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:03:38+00:00",
      "updated_at": "2022-11-17T11:03:38+00:00"
    },
    {
      "name": "CVE-2022-20422",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:03:54+00:00",
      "updated_at": "2022-11-17T11:03:54+00:00"
    },
    {
      "name": "CVE-2022-3028",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:04:27+00:00",
      "updated_at": "2022-11-17T11:04:27+00:00"
    },
    {
      "name": "CVE-2022-3625",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:07:48+00:00",
      "updated_at": "2022-11-17T11:07:48+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:08:08+00:00",
      "updated_at": "2022-11-17T11:08:08+00:00"
    },
    {
      "name": "CVE-2022-40768",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2022-11-17T11:08:56+00:00",
      "updated_at": "2022-11-17T11:08:56+00:00"
    },
    {
      "name": "CVE-2022-3633",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2023-04-21T09:27:38+00:00",
      "updated_at": "2023-04-21T09:27:38+00:00"
    },
    {
      "name": "CVE-2022-3629",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2023-04-21T09:28:19+00:00",
      "updated_at": "2023-04-21T09:28:19+00:00"
    },
    {
      "name": "CVE-2023-1095",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2023-04-21T09:30:58+00:00",
      "updated_at": "2023-04-21T09:30:58+00:00"
    },
    {
      "name": "CVE-2023-2513",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "efa4b4844ee6c77a27295eff38267c01b038ec47e5d77ab8534f692f3ba7b170",
        "name": "linux-libc-dev",
        "version": "5.4.0-132.148",
        "filename": "linux-libc-dev_5.4.0-132.148_i386.deb"
      },
      "created_at": "2023-06-06T10:18:44+00:00",
      "updated_at": "2023-06-06T10:18:44+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-10-18T19:12:39+00:00",
  "updated_at": "2022-10-19T17:03:33+00:00",
  "deleted_at": null
}