c42558122a646853578e217c1a6f7071ba8dfb51f9bf30e3076b7ab8afffb698
e821a535b4f17f9e7533489c927aa608720c60df
7d2cdc0f7c8a269df772c712187b0e6f
5.4.0-144.161
linux-libc-dev_5.4.0-144.161_i386.deb
6158
DEB
linux
I386
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-4382 | 6 | USN | linux-libc-dev 5.4.0-146.163 |
CVE-2021-3669 | 55 | USN | linux-libc-dev 5.4.0-146.163 |
CVE-2023-23559 | 0 | USN | linux-libc-dev 5.4.0-146.163 |
CVE-2022-2196 | 9 | USN | linux-libc-dev 5.4.0-146.163 |
{ "sha256": "c42558122a646853578e217c1a6f7071ba8dfb51f9bf30e3076b7ab8afffb698", "sha1": "e821a535b4f17f9e7533489c927aa608720c60df", "md5": "7d2cdc0f7c8a269df772c712187b0e6f", "type": "DEB", "arch": "I386", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.4.0-144.161_i386.deb", "size": 6158, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.4.0-144.161", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-4382", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "f66337d39df759acff04d424fbdeb5bca104902c47a3354486bc73d76afa0dc5", "name": "linux-libc-dev", "version": "5.4.0-146.163", "filename": "linux-libc-dev_5.4.0-146.163_i386.deb" }, "created_at": "2023-03-29T10:05:18+00:00", "updated_at": "2023-03-29T10:05:18+00:00" }, { "name": "CVE-2021-3669", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f66337d39df759acff04d424fbdeb5bca104902c47a3354486bc73d76afa0dc5", "name": "linux-libc-dev", "version": "5.4.0-146.163", "filename": "linux-libc-dev_5.4.0-146.163_i386.deb" }, "created_at": "2023-03-29T10:11:40+00:00", "updated_at": "2023-03-29T10:11:40+00:00" }, { "name": "CVE-2023-23559", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f66337d39df759acff04d424fbdeb5bca104902c47a3354486bc73d76afa0dc5", "name": "linux-libc-dev", "version": "5.4.0-146.163", "filename": "linux-libc-dev_5.4.0-146.163_i386.deb" }, "created_at": "2023-03-29T10:12:45+00:00", "updated_at": "2023-03-29T10:12:45+00:00" }, { "name": "CVE-2022-2196", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "f66337d39df759acff04d424fbdeb5bca104902c47a3354486bc73d76afa0dc5", "name": "linux-libc-dev", "version": "5.4.0-146.163", "filename": "linux-libc-dev_5.4.0-146.163_i386.deb" }, "created_at": "2023-03-29T10:13:37+00:00", "updated_at": "2023-03-29T10:13:37+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-02-03T14:50:08+00:00", "updated_at": "2023-02-11T11:01:33+00:00", "deleted_at": null }