Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (14)

linux-libc-dev

Hashes
Linux Kernel Headers for development This package provides headers from the Linux kernel. These headers are used by the installed headers for GNU glibc and other system libraries. They are NOT meant to be used to build third-party modules for your kernel. Use linux-headers-* packages for that.
  • SHA256: 8d20bb6c0eaf718b265858383f254df894ebb3497f5240c7782015ef8f7cc577
  • SHA1: be309d46372b3c598bfe83fa45292ea0700435d1
  • MD5: 5b971c2edba1577411112f379dfbb54d
Information
  • Version: 5.15.0-47.51
  • Filename: linux-libc-dev_5.15.0-47.51_amd64.deb
  • Size: 6549
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>

Vulnerabilities

Raw Object

{
  "sha256": "8d20bb6c0eaf718b265858383f254df894ebb3497f5240c7782015ef8f7cc577",
  "sha1": "be309d46372b3c598bfe83fa45292ea0700435d1",
  "md5": "5b971c2edba1577411112f379dfbb54d",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-libc-dev",
  "filename": "linux-libc-dev_5.15.0-47.51_amd64.deb",
  "size": 6549,
  "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel.  These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.",
  "url": null,
  "version": "5.15.0-47.51",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": null,
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T16:49:31+00:00",
      "updated_at": "2022-09-21T16:49:31+00:00"
    },
    {
      "name": "CVE-2022-36946",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:01:11+00:00",
      "updated_at": "2022-09-21T17:01:11+00:00"
    },
    {
      "name": "CVE-2022-34494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:05:43+00:00",
      "updated_at": "2022-09-21T17:05:43+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:06:15+00:00",
      "updated_at": "2022-09-21T17:06:15+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:06:17+00:00",
      "updated_at": "2022-09-21T17:06:17+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:07:26+00:00",
      "updated_at": "2022-09-21T17:07:26+00:00"
    },
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:07:37+00:00",
      "updated_at": "2022-09-21T17:07:37+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:07:45+00:00",
      "updated_at": "2022-09-21T17:07:45+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:08:02+00:00",
      "updated_at": "2022-09-21T17:08:02+00:00"
    },
    {
      "name": "CVE-2022-34495",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:08:06+00:00",
      "updated_at": "2022-09-21T17:08:06+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2022-09-21T17:08:10+00:00",
      "updated_at": "2022-09-21T17:08:10+00:00"
    },
    {
      "name": "CVE-2022-3104",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2023-03-07T11:44:04+00:00",
      "updated_at": "2023-03-07T11:44:04+00:00"
    },
    {
      "name": "CVE-2022-3110",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2023-03-07T12:11:05+00:00",
      "updated_at": "2023-03-07T12:11:05+00:00"
    },
    {
      "name": "CVE-2023-2008",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a542a5d7a550a2444be43b6f6f490d32e24754f75c8b631e82ce3271f4819b79",
        "name": "linux-libc-dev",
        "version": "5.15.0-48.54",
        "filename": "linux-libc-dev_5.15.0-48.54_amd64.deb"
      },
      "created_at": "2023-05-13T10:47:32+00:00",
      "updated_at": "2023-05-13T10:47:32+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-08-11T09:10:10+00:00",
  "updated_at": "2022-08-16T03:17:16+00:00",
  "deleted_at": null
}