3cd1b7cc5ae39a6e5beecaa50e5e266e2f5babfe5027d47f844c98e8a415c3d2
70cc019f36ec87ea202ec996ed43cf7768926d71
6fc98dffafe7752a48c019bdb91d1b8b
5.15.0-47.51
linux-headers-5.15.0-47_5.15.0-47.51_all.deb
75542
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
coreutils
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-33741 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-36946 | 75 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-34494 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33744 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-26365 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33743 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2021-33655 | 78 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33740 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-2318 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-34495 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33742 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-3104 | 6 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-3110 | 6 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2023-2008 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
{ "sha256": "3cd1b7cc5ae39a6e5beecaa50e5e266e2f5babfe5027d47f844c98e8a415c3d2", "sha1": "70cc019f36ec87ea202ec996ed43cf7768926d71", "md5": "6fc98dffafe7752a48c019bdb91d1b8b", "type": "DEB", "arch": "ALL", "name": "linux-headers-5.15.0-47", "filename": "linux-headers-5.15.0-47_5.15.0-47.51_all.deb", "size": 75542, "description": "Header files related to Linux kernel version 5.15.0\nThis package provides kernel header files for version 5.15.0, for sites\nthat want the latest kernel headers. Please read\n/usr/share/doc/linux-headers-5.15.0-47/debian.README.gz for details", "url": null, "version": "5.15.0-47.51", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "coreutils", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-33741", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T16:49:31+00:00", "updated_at": "2022-09-21T16:49:31+00:00" }, { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:01:11+00:00", "updated_at": "2022-09-21T17:01:11+00:00" }, { "name": "CVE-2022-34494", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:05:43+00:00", "updated_at": "2022-09-21T17:05:43+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:06:15+00:00", "updated_at": "2022-09-21T17:06:15+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:06:17+00:00", "updated_at": "2022-09-21T17:06:17+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:26+00:00", "updated_at": "2022-09-21T17:07:26+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:37+00:00", "updated_at": "2022-09-21T17:07:37+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:45+00:00", "updated_at": "2022-09-21T17:07:45+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:02+00:00", "updated_at": "2022-09-21T17:08:02+00:00" }, { "name": "CVE-2022-34495", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:06+00:00", "updated_at": "2022-09-21T17:08:06+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:10+00:00", "updated_at": "2022-09-21T17:08:10+00:00" }, { "name": "CVE-2022-3104", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-03-07T11:44:04+00:00", "updated_at": "2023-03-07T11:44:04+00:00" }, { "name": "CVE-2022-3110", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-03-07T12:11:05+00:00", "updated_at": "2023-03-07T12:11:05+00:00" }, { "name": "CVE-2023-2008", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-05-13T10:47:32+00:00", "updated_at": "2023-05-13T10:47:32+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-08-11T09:10:10+00:00", "updated_at": "2022-08-16T03:17:13+00:00", "deleted_at": null }