Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (14)

linux-headers-5.15.0-47

Hashes
Header files related to Linux kernel version 5.15.0 This package provides kernel header files for version 5.15.0, for sites that want the latest kernel headers. Please read /usr/share/doc/linux-headers-5.15.0-47/debian.README.gz for details
  • SHA256: 3cd1b7cc5ae39a6e5beecaa50e5e266e2f5babfe5027d47f844c98e8a415c3d2
  • SHA1: 70cc019f36ec87ea202ec996ed43cf7768926d71
  • MD5: 6fc98dffafe7752a48c019bdb91d1b8b
Information
  • Version: 5.15.0-47.51
  • Filename: linux-headers-5.15.0-47_5.15.0-47.51_all.deb
  • Size: 75542
  • Type: DEB
  • Source: linux
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: coreutils

Vulnerabilities

Raw Object

{
  "sha256": "3cd1b7cc5ae39a6e5beecaa50e5e266e2f5babfe5027d47f844c98e8a415c3d2",
  "sha1": "70cc019f36ec87ea202ec996ed43cf7768926d71",
  "md5": "6fc98dffafe7752a48c019bdb91d1b8b",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-headers-5.15.0-47",
  "filename": "linux-headers-5.15.0-47_5.15.0-47.51_all.deb",
  "size": 75542,
  "description": "Header files related to Linux kernel version 5.15.0\nThis package provides kernel header files for version 5.15.0, for sites\nthat want the latest kernel headers. Please read\n/usr/share/doc/linux-headers-5.15.0-47/debian.README.gz for details",
  "url": null,
  "version": "5.15.0-47.51",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "coreutils",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T16:49:31+00:00",
      "updated_at": "2022-09-21T16:49:31+00:00"
    },
    {
      "name": "CVE-2022-36946",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:01:11+00:00",
      "updated_at": "2022-09-21T17:01:11+00:00"
    },
    {
      "name": "CVE-2022-34494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:05:43+00:00",
      "updated_at": "2022-09-21T17:05:43+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:06:15+00:00",
      "updated_at": "2022-09-21T17:06:15+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:06:17+00:00",
      "updated_at": "2022-09-21T17:06:17+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:07:26+00:00",
      "updated_at": "2022-09-21T17:07:26+00:00"
    },
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:07:37+00:00",
      "updated_at": "2022-09-21T17:07:37+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:07:45+00:00",
      "updated_at": "2022-09-21T17:07:45+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:08:02+00:00",
      "updated_at": "2022-09-21T17:08:02+00:00"
    },
    {
      "name": "CVE-2022-34495",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:08:06+00:00",
      "updated_at": "2022-09-21T17:08:06+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2022-09-21T17:08:10+00:00",
      "updated_at": "2022-09-21T17:08:10+00:00"
    },
    {
      "name": "CVE-2022-3104",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2023-03-07T11:44:04+00:00",
      "updated_at": "2023-03-07T11:44:04+00:00"
    },
    {
      "name": "CVE-2022-3110",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2023-03-07T12:11:05+00:00",
      "updated_at": "2023-03-07T12:11:05+00:00"
    },
    {
      "name": "CVE-2023-2008",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_i386.deb"
      },
      "created_at": "2023-05-13T10:47:32+00:00",
      "updated_at": "2023-05-13T10:47:32+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-08-11T09:10:10+00:00",
  "updated_at": "2022-08-16T03:17:13+00:00",
  "deleted_at": null
}