63c365e8dd0a8cb13a040c3e9b04f5c147a4635a7a1fb90f170dbec2111bb594
b251a49721ff52dc51d6dd6e4c9301cb4ff6617d
1a46a0d10904bfb83890cd974b0b2bba
5.15.0-53.59
linux-libc-dev_5.15.0-53.59_amd64.deb
6606
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3594 | 75 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-43945 | 8 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-42703 | 55 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-3566 | 71 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-3564 | 80 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-3567 | 71 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-3621 | 8 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-3524 | 75 | USN | linux-libc-dev 5.15.0-56.62 |
CVE-2022-3565 | 80 | USN | linux-libc-dev 5.15.0-56.62 |
{ "sha256": "63c365e8dd0a8cb13a040c3e9b04f5c147a4635a7a1fb90f170dbec2111bb594", "sha1": "b251a49721ff52dc51d6dd6e4c9301cb4ff6617d", "md5": "1a46a0d10904bfb83890cd974b0b2bba", "type": "DEB", "arch": "AMD64", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.15.0-53.59_amd64.deb", "size": 6606, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.15.0-53.59", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:27:35+00:00", "updated_at": "2022-12-02T12:27:35+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:37:55+00:00", "updated_at": "2022-12-02T12:37:55+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:39:47+00:00", "updated_at": "2022-12-02T12:39:47+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:41:42+00:00", "updated_at": "2022-12-02T12:41:42+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:42:28+00:00", "updated_at": "2022-12-02T12:42:28+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:43:16+00:00", "updated_at": "2022-12-02T12:43:16+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:44:20+00:00", "updated_at": "2022-12-02T12:44:20+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:45:45+00:00", "updated_at": "2022-12-02T12:45:45+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-02T12:46:25+00:00", "updated_at": "2022-12-02T12:46:25+00:00" } ], "risk": 80, "vulnerable": 80, "outdated": 80, "malicious": 0, "created_at": "2022-10-17T20:20:12+00:00", "updated_at": "2022-10-26T17:27:38+00:00", "deleted_at": null }