4c4a86bef33edca551c6a557fde98a8e7f374d0a689fad64125d7ae13aa12e65
9f883d7346d43ea093dab7073f6f5d269d670032
08e58285538eb95db8a5c9dcfd26749d
5.10.127-1
linux-headers-5.10.0-16-rt-686-pae_5.10.127-1_i386.deb
5362
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-5.10.0-16-common-rt (= 5.10.127-1), linux-kbuild-5.10 (>= 5.10.127-1), linux-compiler-gcc-10-x86
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "4c4a86bef33edca551c6a557fde98a8e7f374d0a689fad64125d7ae13aa12e65", "sha1": "9f883d7346d43ea093dab7073f6f5d269d670032", "md5": "08e58285538eb95db8a5c9dcfd26749d", "type": "DEB", "arch": "I386", "name": "linux-headers-5.10.0-16-rt-686-pae", "filename": "linux-headers-5.10.0-16-rt-686-pae_5.10.127-1_i386.deb", "size": 5362, "description": "Header files for Linux 5.10.0-16-rt-686-pae\nThis package provides the architecture-specific kernel header files for\nLinux kernel 5.10.0-16-rt-686-pae, generally used for building out-of-tree\nkernel modules. These files are going to be installed into\n/usr/src/linux-headers-5.10.0-16-rt-686-pae, and can be used for building\nmodules that load into the kernel provided by the\nlinux-image-5.10.0-16-rt-686-pae package.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-5.10.0-16-common-rt (= 5.10.127-1), linux-kbuild-5.10 (>= 5.10.127-1), linux-compiler-gcc-10-x86", "applications": [], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:15:46+00:00", "updated_at": "2022-07-27T20:15:46+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:19+00:00", "updated_at": "2022-07-27T20:16:19+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:52+00:00", "updated_at": "2022-07-27T20:16:52+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:24+00:00", "updated_at": "2022-07-27T20:17:24+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:57+00:00", "updated_at": "2022-07-27T20:17:57+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:27+00:00", "updated_at": "2022-07-27T20:18:27+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:58+00:00", "updated_at": "2022-07-27T20:18:58+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:29+00:00", "updated_at": "2022-07-27T20:19:29+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:20:00+00:00", "updated_at": "2022-07-27T20:20:00+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T06:37:52+00:00", "updated_at": "2022-07-02T01:55:41+00:00", "deleted_at": null }