ef811aa764148bc3335d8e5e9c1e7d286ee5cd1fa59002197db55ee54a8537d8
58119984357b9e6b64695487fd5742e82be4b610
c6cc76858cd44c9c3502811eaad416b4
5.15.0-59.65
linux-libc-dev_5.15.0-59.65_i386.deb
6643
DEB
linux
I386
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3543 | 55 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3623 | 8 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3640 | 9 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-42895 | 6 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-0590 | 5 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-3619 | 43 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-41850 | 47 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-47940 | 8 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-41849 | 42 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-22998 | 6 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2022-1184 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-3006 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
CVE-2023-3812 | 0 | USN | linux-libc-dev 5.15.0-60.66 |
{ "sha256": "ef811aa764148bc3335d8e5e9c1e7d286ee5cd1fa59002197db55ee54a8537d8", "sha1": "58119984357b9e6b64695487fd5742e82be4b610", "md5": "c6cc76858cd44c9c3502811eaad416b4", "type": "DEB", "arch": "I386", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.15.0-59.65_i386.deb", "size": 6643, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.15.0-59.65", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:16:51+00:00", "updated_at": "2023-02-10T10:16:51+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:22:53+00:00", "updated_at": "2023-02-10T10:22:53+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:27:53+00:00", "updated_at": "2023-02-10T10:27:53+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:30:09+00:00", "updated_at": "2023-02-10T10:30:09+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:31:28+00:00", "updated_at": "2023-02-10T10:31:28+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:32:51+00:00", "updated_at": "2023-02-10T10:32:51+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:32:58+00:00", "updated_at": "2023-02-10T10:32:58+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:35:00+00:00", "updated_at": "2023-02-10T10:35:00+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:39:33+00:00", "updated_at": "2023-02-10T10:39:33+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-02-10T10:41:15+00:00", "updated_at": "2023-02-10T10:41:15+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-04-21T09:28:50+00:00", "updated_at": "2023-04-21T09:28:50+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-06-06T10:06:15+00:00", "updated_at": "2023-06-06T10:06:15+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-07-12T10:07:00+00:00", "updated_at": "2023-07-12T10:07:00+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "b624ff01bfa0c1ea4794c4f1c45056d2b38d19db8f7f171d084994dc714ce1d7", "name": "linux-libc-dev", "version": "5.15.0-60.66", "filename": "linux-libc-dev_5.15.0-60.66_i386.deb" }, "created_at": "2023-08-09T09:33:01+00:00", "updated_at": "2023-08-09T09:33:01+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-09T23:09:31+00:00", "updated_at": "2023-01-11T11:47:40+00:00", "deleted_at": null }