Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (17)

linux-libc-dev

Hashes
Linux Kernel Headers for development This package provides headers from the Linux kernel. These headers are used by the installed headers for GNU glibc and other system libraries. They are NOT meant to be used to build third-party modules for your kernel. Use linux-headers-* packages for that.
  • SHA256: f8e6ac8a99742cb77a8508f93cc33577f3d4e2a3d1b99e51382064ea14b163c1
  • SHA1: 5b67402c41fdbaf150b70ab218091ee2148a2080
  • MD5: 5bafa7eac74965aecd285b93b5232788
Information
  • Version: 4.15.0-201.212
  • Filename: linux-libc-dev_4.15.0-201.212_amd64.deb
  • Size: 5608
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-4270355USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356671USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356480USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356771USN
linux-libc-dev
4.15.0-200.211
CVE-2022-36218USN
linux-libc-dev
4.15.0-200.211
CVE-2022-352475USN
linux-libc-dev
4.15.0-200.211
CVE-2022-356580USN
linux-libc-dev
4.15.0-200.211
CVE-2022-323978USN
linux-libc-dev
4.15.0-200.211
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-libc-dev
4.15.0-202.213
CVE-2022-459348USN
linux-libc-dev
4.15.0-202.213
CVE-2022-428969USN
linux-libc-dev
4.15.0-202.213
CVE-2022-364310USN
linux-libc-dev
4.15.0-202.213

Raw Object

{
  "sha256": "f8e6ac8a99742cb77a8508f93cc33577f3d4e2a3d1b99e51382064ea14b163c1",
  "sha1": "5b67402c41fdbaf150b70ab218091ee2148a2080",
  "md5": "5bafa7eac74965aecd285b93b5232788",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-libc-dev",
  "filename": "linux-libc-dev_4.15.0-201.212_amd64.deb",
  "size": 5608,
  "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel.  These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.",
  "url": null,
  "version": "4.15.0-201.212",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": null,
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:23:21+00:00",
      "updated_at": "2022-12-02T12:23:21+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:39:35+00:00",
      "updated_at": "2022-12-02T12:39:35+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:41:28+00:00",
      "updated_at": "2022-12-02T12:41:28+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:42:12+00:00",
      "updated_at": "2022-12-02T12:42:12+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:43:00+00:00",
      "updated_at": "2022-12-02T12:43:00+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:44:07+00:00",
      "updated_at": "2022-12-02T12:44:07+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:45:29+00:00",
      "updated_at": "2022-12-02T12:45:29+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:46:12+00:00",
      "updated_at": "2022-12-02T12:46:12+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6f445366d7d5c6f107162dd6fd23574a89b8a36a17e7c28307054d2aec8a7d7a",
        "name": "linux-libc-dev",
        "version": "4.15.0-200.211",
        "filename": "linux-libc-dev_4.15.0-200.211_amd64.deb"
      },
      "created_at": "2022-12-02T12:46:52+00:00",
      "updated_at": "2022-12-02T12:46:52+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:43:13+00:00",
      "updated_at": "2023-01-13T10:43:13+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:39+00:00",
      "updated_at": "2023-01-13T10:52:39+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:04+00:00",
      "updated_at": "2023-01-13T10:53:04+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:08+00:00",
      "updated_at": "2023-01-13T10:55:08+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-14T10:24:53+00:00",
      "updated_at": "2023-01-14T10:24:53+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-14T10:25:59+00:00",
      "updated_at": "2023-01-14T10:25:59+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-14T10:26:15+00:00",
      "updated_at": "2023-01-14T10:26:15+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3a786dfa1590548546d79750670878ff90d00dc09c882177306989210eb39cd5",
        "name": "linux-libc-dev",
        "version": "4.15.0-202.213",
        "filename": "linux-libc-dev_4.15.0-202.213_amd64.deb"
      },
      "created_at": "2023-01-14T10:26:36+00:00",
      "updated_at": "2023-01-14T10:26:36+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-28T13:20:18+00:00",
  "updated_at": "2022-12-02T11:05:18+00:00",
  "deleted_at": null
}