cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1
81c1660e40f65e6abe529ee744d748e15a1a6764
b751b75797c5243cf1eab7c6a78c18de
5.15.0-47.51
linux-libc-dev_5.15.0-47.51_i386.deb
6549
DEB
linux
I386
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-33741 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-36946 | 75 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-34494 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33744 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-26365 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33743 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2021-33655 | 78 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33740 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-2318 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-34495 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-33742 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-3104 | 6 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2022-3110 | 6 | USN | linux-libc-dev 5.15.0-48.54 |
CVE-2023-2008 | 0 | USN | linux-libc-dev 5.15.0-48.54 |
{ "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "sha1": "81c1660e40f65e6abe529ee744d748e15a1a6764", "md5": "b751b75797c5243cf1eab7c6a78c18de", "type": "DEB", "arch": "I386", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb", "size": 6549, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.15.0-47.51", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-33741", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T16:49:31+00:00", "updated_at": "2022-09-21T16:49:31+00:00" }, { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:01:11+00:00", "updated_at": "2022-09-21T17:01:11+00:00" }, { "name": "CVE-2022-34494", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:05:43+00:00", "updated_at": "2022-09-21T17:05:43+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:06:15+00:00", "updated_at": "2022-09-21T17:06:15+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:06:17+00:00", "updated_at": "2022-09-21T17:06:17+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:26+00:00", "updated_at": "2022-09-21T17:07:26+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:37+00:00", "updated_at": "2022-09-21T17:07:37+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:07:45+00:00", "updated_at": "2022-09-21T17:07:45+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:02+00:00", "updated_at": "2022-09-21T17:08:02+00:00" }, { "name": "CVE-2022-34495", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:06+00:00", "updated_at": "2022-09-21T17:08:06+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2022-09-21T17:08:10+00:00", "updated_at": "2022-09-21T17:08:10+00:00" }, { "name": "CVE-2022-3104", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-03-07T11:44:04+00:00", "updated_at": "2023-03-07T11:44:04+00:00" }, { "name": "CVE-2022-3110", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-03-07T12:11:05+00:00", "updated_at": "2023-03-07T12:11:05+00:00" }, { "name": "CVE-2023-2008", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "80898eb79a94ce028792715ef37fcab3ef3f2fa828bc77831fff7e97d78790ee", "name": "linux-libc-dev", "version": "5.15.0-48.54", "filename": "linux-libc-dev_5.15.0-48.54_i386.deb" }, "created_at": "2023-05-13T10:47:32+00:00", "updated_at": "2023-05-13T10:47:32+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-08-11T07:51:14+00:00", "updated_at": "2022-08-16T03:17:12+00:00", "deleted_at": null }