950bc5358b6f30050a4877d71aa9202e93228c3e1c32a37e821a1cb9cf4b2fe0
f9f9a53f5ec7026955a5dc741353eac260628c3a
91782e8215c8ca8e7fb4fdb69bad0860
5.15.0-58.64
linux-libc-dev_5.15.0-58.64_i386.deb
6623
DEB
linux
I386
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3543 | 55 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3623 | 8 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3640 | 9 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-42895 | 6 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-0590 | 5 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3619 | 43 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-41850 | 47 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-47940 | 8 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-41849 | 42 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-22998 | 6 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-1872 | 7 | USN | linux-libc-dev 5.15.0-71.78 |
CVE-2023-1829 | 8 | USN | linux-libc-dev 5.15.0-71.78 |
CVE-2022-1184 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-3006 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-3812 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
{ "sha256": "950bc5358b6f30050a4877d71aa9202e93228c3e1c32a37e821a1cb9cf4b2fe0", "sha1": "f9f9a53f5ec7026955a5dc741353eac260628c3a", "md5": "91782e8215c8ca8e7fb4fdb69bad0860", "type": "DEB", "arch": "I386", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.15.0-58.64_i386.deb", "size": 6623, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.15.0-58.64", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:16:51+00:00", "updated_at": "2023-02-10T10:16:51+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:22:52+00:00", "updated_at": "2023-02-10T10:22:52+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:27:52+00:00", "updated_at": "2023-02-10T10:27:52+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:30:09+00:00", "updated_at": "2023-02-10T10:30:09+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:31:28+00:00", "updated_at": "2023-02-10T10:31:28+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:32:51+00:00", "updated_at": "2023-02-10T10:32:51+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:32:58+00:00", "updated_at": "2023-02-10T10:32:58+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:34:59+00:00", "updated_at": "2023-02-10T10:34:59+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:39:33+00:00", "updated_at": "2023-02-10T10:39:33+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:41:15+00:00", "updated_at": "2023-02-10T10:41:15+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-04-21T09:28:49+00:00", "updated_at": "2023-04-21T09:28:49+00:00" }, { "name": "CVE-2023-1872", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "ff8c6167565499bfb75dc6cab8bd5634efcfae5529f55f591ba1cd0e2c836ffb", "name": "linux-libc-dev", "version": "5.15.0-71.78", "filename": "linux-libc-dev_5.15.0-71.78_i386.deb" }, "created_at": "2023-04-28T22:46:09+00:00", "updated_at": "2023-04-28T22:46:09+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ff8c6167565499bfb75dc6cab8bd5634efcfae5529f55f591ba1cd0e2c836ffb", "name": "linux-libc-dev", "version": "5.15.0-71.78", "filename": "linux-libc-dev_5.15.0-71.78_i386.deb" }, "created_at": "2023-04-29T07:29:11+00:00", "updated_at": "2023-04-29T07:29:11+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-06-06T10:06:14+00:00", "updated_at": "2023-06-06T10:06:14+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-07-12T10:06:59+00:00", "updated_at": "2023-07-12T10:06:59+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-08-09T09:33:00+00:00", "updated_at": "2023-08-09T09:33:00+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-05T11:43:40+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }