4f7243d73c59f2987c127f7586211a21e3f7d11521e919c27e41ccd15aca464d
91b58c5ab694c24b48f59bb6380de76ee3fb0767
125c2c91fd6942abcfa5c29e56f3cde2
5.10.158-2
linux-headers-5.10.0-20-common-rt_5.10.158-2_all.deb
40871
DEB
linux
ALL
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
{ "sha256": "4f7243d73c59f2987c127f7586211a21e3f7d11521e919c27e41ccd15aca464d", "sha1": "91b58c5ab694c24b48f59bb6380de76ee3fb0767", "md5": "125c2c91fd6942abcfa5c29e56f3cde2", "type": "DEB", "arch": "ALL", "name": "linux-headers-5.10.0-20-common-rt", "filename": "linux-headers-5.10.0-20-common-rt_5.10.158-2_all.deb", "size": 40871, "description": "Common header files for Linux 5.10.0-20-rt\nThis package provides the common kernel header files for Linux kernel\nversion 5.10.0-20 with the PREEMPT_RT featureset, generally used for\nbuilding out-of-tree kernel modules. To obtain a complete set of headers\nyou also need to install the linux-headers-5.10.0-20-(flavour) package,\nmatching the flavour of the kernel you intend the build for.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:33+00:00", "updated_at": "2023-01-25T10:38:33+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:37+00:00", "updated_at": "2023-01-25T10:38:37+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:40+00:00", "updated_at": "2023-01-25T10:38:40+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:43+00:00", "updated_at": "2023-01-25T10:38:43+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:44+00:00", "updated_at": "2023-01-25T10:38:44+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:47+00:00", "updated_at": "2023-01-25T10:38:47+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T03:05:48+00:00", "updated_at": "2022-12-16T10:14:52+00:00", "deleted_at": null }