99614beff28d61f87def717103159c497a0665cbb33d8d364c70b6095390bf79
9f4ff9aa4632ce373f5790702a131177ac8b4cf9
442a77963d4359f98faeeeab7166e9cb
5.10.158-2
linux-doc_5.10.158-2_all.deb
10
DEB
linux
ALL
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-doc-5.10 (= 5.10.158-2)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
{ "sha256": "99614beff28d61f87def717103159c497a0665cbb33d8d364c70b6095390bf79", "sha1": "9f4ff9aa4632ce373f5790702a131177ac8b4cf9", "md5": "442a77963d4359f98faeeeab7166e9cb", "type": "DEB", "arch": "ALL", "name": "linux-doc", "filename": "linux-doc_5.10.158-2_all.deb", "size": 10, "description": "Linux kernel specific documentation (meta-package)\nThis package depends on the package containing the documentation for the\nlatest Linux kernel.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-doc-5.10 (= 5.10.158-2)", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:33+00:00", "updated_at": "2023-01-25T10:38:33+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:37+00:00", "updated_at": "2023-01-25T10:38:37+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:44+00:00", "updated_at": "2023-01-25T10:38:44+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T03:05:48+00:00", "updated_at": "2022-12-16T10:14:42+00:00", "deleted_at": null }