e45f72d13be936ddaa2b7df99f898244b41f10c98b055152601c5130ca6e3d18
4fe73a7b4e46ea41466b02ea063cd088fbd13130
c0a4e0e63c2091cb29d78e85a0a8c3b7
5.15.0-59.65
linux-libc-dev_5.15.0-59.65_amd64.deb
6643
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3543 | 55 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3623 | 8 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3640 | 9 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-42895 | 6 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-0590 | 5 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3619 | 43 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-41850 | 47 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-47940 | 8 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-41849 | 42 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-22998 | 6 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-1184 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-3006 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-3812 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
{ "sha256": "e45f72d13be936ddaa2b7df99f898244b41f10c98b055152601c5130ca6e3d18", "sha1": "4fe73a7b4e46ea41466b02ea063cd088fbd13130", "md5": "c0a4e0e63c2091cb29d78e85a0a8c3b7", "type": "DEB", "arch": "AMD64", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.15.0-59.65_amd64.deb", "size": 6643, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.15.0-59.65", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:16:51+00:00", "updated_at": "2023-02-10T10:16:51+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:22:53+00:00", "updated_at": "2023-02-10T10:22:53+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:27:53+00:00", "updated_at": "2023-02-10T10:27:53+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:30:09+00:00", "updated_at": "2023-02-10T10:30:09+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:31:28+00:00", "updated_at": "2023-02-10T10:31:28+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:32:51+00:00", "updated_at": "2023-02-10T10:32:51+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:32:58+00:00", "updated_at": "2023-02-10T10:32:58+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:35:00+00:00", "updated_at": "2023-02-10T10:35:00+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:39:33+00:00", "updated_at": "2023-02-10T10:39:33+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-02-10T10:41:15+00:00", "updated_at": "2023-02-10T10:41:15+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-04-21T09:28:50+00:00", "updated_at": "2023-04-21T09:28:50+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-06-06T10:06:15+00:00", "updated_at": "2023-06-06T10:06:15+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-07-12T10:06:59+00:00", "updated_at": "2023-07-12T10:06:59+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f9d4e1ae18ba12a9d00cc0595e2f7a098fa1169fced6b1e439364a2d739b59b6", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_amd64.deb" }, "created_at": "2023-08-09T09:33:01+00:00", "updated_at": "2023-08-09T09:33:01+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-09T23:08:59+00:00", "updated_at": "2023-01-11T11:47:40+00:00", "deleted_at": null }