Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (15)

linux-libc-dev

Hashes
Linux Kernel Headers for development This package provides headers from the Linux kernel. These headers are used by the installed headers for GNU glibc and other system libraries. They are NOT meant to be used to build third-party modules for your kernel. Use linux-headers-* packages for that.
  • SHA256: 70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756
  • SHA1: 8dc9ecfe7a1ccff24bedb6ea6c8411777586bacf
  • MD5: 9d588093eadd0f6b4ef8705330c2182a
Information
  • Version: 5.4.0-136.153
  • Filename: linux-libc-dev_5.4.0-136.153_i386.deb
  • Size: 6126
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>

Vulnerabilities

Raw Object

{
  "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
  "sha1": "8dc9ecfe7a1ccff24bedb6ea6c8411777586bacf",
  "md5": "9d588093eadd0f6b4ef8705330c2182a",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-libc-dev",
  "filename": "linux-libc-dev_5.4.0-136.153_i386.deb",
  "size": 6126,
  "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel.  These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.",
  "url": null,
  "version": "5.4.0-136.153",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": null,
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-02T12:25:41+00:00",
      "updated_at": "2022-12-02T12:25:41+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-02T12:41:40+00:00",
      "updated_at": "2022-12-02T12:41:40+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-02T12:42:26+00:00",
      "updated_at": "2022-12-02T12:42:26+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-02T12:43:14+00:00",
      "updated_at": "2022-12-02T12:43:14+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-02T12:44:19+00:00",
      "updated_at": "2022-12-02T12:44:19+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-02T12:45:43+00:00",
      "updated_at": "2022-12-02T12:45:43+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-02T12:46:23+00:00",
      "updated_at": "2022-12-02T12:46:23+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:44:36+00:00",
      "updated_at": "2023-01-13T10:44:36+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:45+00:00",
      "updated_at": "2023-01-13T10:52:45+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:10+00:00",
      "updated_at": "2023-01-13T10:53:10+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:15+00:00",
      "updated_at": "2023-01-13T10:55:15+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "727510a50709428fee848548cff535362263ad03e2d9668bf4b4dbf066d33431",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_i386.deb"
      },
      "created_at": "2023-01-14T10:24:56+00:00",
      "updated_at": "2023-01-14T10:24:56+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "727510a50709428fee848548cff535362263ad03e2d9668bf4b4dbf066d33431",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_i386.deb"
      },
      "created_at": "2023-01-14T10:26:03+00:00",
      "updated_at": "2023-01-14T10:26:03+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "727510a50709428fee848548cff535362263ad03e2d9668bf4b4dbf066d33431",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_i386.deb"
      },
      "created_at": "2023-01-14T10:26:18+00:00",
      "updated_at": "2023-01-14T10:26:18+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "727510a50709428fee848548cff535362263ad03e2d9668bf4b4dbf066d33431",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_i386.deb"
      },
      "created_at": "2023-01-14T10:26:39+00:00",
      "updated_at": "2023-01-14T10:26:39+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-24T15:57:14+00:00",
  "updated_at": "2022-12-01T10:34:54+00:00",
  "deleted_at": null
}