bf546a164fe98ffb8e5b7497103c1d8ca0b33623cbbb20f98bfaf37262bb1056
9b9cb5116573d0e5f7574f2ca63902e5f3e91b8e
f22b13ed0147330356f794545aa8276a
5.4.0-125.141
linux-libc-dev_5.4.0-125.141_amd64.deb
6082
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-1012 | 91 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-36946 | 75 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-32296 | 0 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-2503 | 67 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2021-33655 | 78 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-1729 | 70 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-3577 | 78 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-20572 | 7 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-3115 | 6 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2023-1838 | 7 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2022-1974 | 41 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2023-2008 | 0 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2023-4387 | 7 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2023-4459 | 6 | USN | linux-libc-dev 5.4.0-126.142 |
CVE-2023-4385 | 6 | USN | linux-libc-dev 5.4.0-126.142 |
{ "sha256": "bf546a164fe98ffb8e5b7497103c1d8ca0b33623cbbb20f98bfaf37262bb1056", "sha1": "9b9cb5116573d0e5f7574f2ca63902e5f3e91b8e", "md5": "f22b13ed0147330356f794545aa8276a", "type": "DEB", "arch": "AMD64", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.4.0-125.141_amd64.deb", "size": 6082, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.4.0-125.141", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2022-09-21T16:54:25+00:00", "updated_at": "2022-09-21T16:54:25+00:00" }, { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2022-09-21T17:01:10+00:00", "updated_at": "2022-09-21T17:01:10+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2022-09-21T17:04:19+00:00", "updated_at": "2022-09-21T17:04:19+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2022-09-21T17:04:45+00:00", "updated_at": "2022-09-21T17:04:45+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2022-09-21T17:07:35+00:00", "updated_at": "2022-09-21T17:07:35+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2022-09-21T17:08:23+00:00", "updated_at": "2022-09-21T17:08:23+00:00" }, { "name": "CVE-2022-3577", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-01-29T16:10:27+00:00", "updated_at": "2023-01-29T16:10:27+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-03-07T11:46:21+00:00", "updated_at": "2023-03-07T11:46:21+00:00" }, { "name": "CVE-2022-3115", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-03-07T12:09:15+00:00", "updated_at": "2023-03-07T12:09:15+00:00" }, { "name": "CVE-2023-1838", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-04-21T09:27:12+00:00", "updated_at": "2023-04-21T09:27:12+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-04-21T09:33:01+00:00", "updated_at": "2023-04-21T09:33:01+00:00" }, { "name": "CVE-2023-2008", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-05-13T10:47:31+00:00", "updated_at": "2023-05-13T10:47:31+00:00" }, { "name": "CVE-2023-4387", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-09-13T09:50:58+00:00", "updated_at": "2023-09-13T09:50:58+00:00" }, { "name": "CVE-2023-4459", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-09-13T10:29:04+00:00", "updated_at": "2023-09-13T10:29:04+00:00" }, { "name": "CVE-2023-4385", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "08904f96693bcb55b2ea46da22c19a9bc39d221bb422a39ebfd6606339b8883e", "name": "linux-libc-dev", "version": "5.4.0-126.142", "filename": "linux-libc-dev_5.4.0-126.142_amd64.deb" }, "created_at": "2023-09-13T10:59:44+00:00", "updated_at": "2023-09-13T10:59:44+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-08-10T16:02:10+00:00", "updated_at": "2022-08-13T02:27:45+00:00", "deleted_at": null }