fcefbe13018692bbb523d681c7139214572f6b0b57c0aab44ffedc84ddac8039
e9455180e684f26c4a84a54a3fc210cbef231969
fa76817a8f39026e2c2ebae6d441c873
5.4.0-131.147
linux-libc-dev_5.4.0-131.147_amd64.deb
6107
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-39188 | 47 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3635 | 7 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-29901 | 0 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-2978 | 78 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-2153 | 55 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-41222 | 47 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-42703 | 55 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-20422 | 70 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3028 | 70 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3625 | 8 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-42719 | 88 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-40768 | 55 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3633 | 3 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2022-3629 | 3 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2023-1095 | 6 | USN | linux-libc-dev 5.4.0-132.148 |
CVE-2023-2513 | 7 | USN | linux-libc-dev 5.4.0-132.148 |
{ "sha256": "fcefbe13018692bbb523d681c7139214572f6b0b57c0aab44ffedc84ddac8039", "sha1": "e9455180e684f26c4a84a54a3fc210cbef231969", "md5": "fa76817a8f39026e2c2ebae6d441c873", "type": "DEB", "arch": "AMD64", "name": "linux-libc-dev", "filename": "linux-libc-dev_5.4.0-131.147_amd64.deb", "size": 6107, "description": "Linux Kernel Headers for development\nThis package provides headers from the Linux kernel. These headers\nare used by the installed headers for GNU glibc and other system\nlibraries. They are NOT meant to be used to build third-party modules for\nyour kernel. Use linux-headers-* packages for that.", "url": null, "version": "5.4.0-131.147", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T10:37:03+00:00", "updated_at": "2022-11-17T10:37:03+00:00" }, { "name": "CVE-2022-3635", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T10:41:59+00:00", "updated_at": "2022-11-17T10:41:59+00:00" }, { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T10:48:45+00:00", "updated_at": "2022-11-17T10:48:45+00:00" }, { "name": "CVE-2022-2978", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:02:36+00:00", "updated_at": "2022-11-17T11:02:36+00:00" }, { "name": "CVE-2022-2153", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:06+00:00", "updated_at": "2022-11-17T11:03:06+00:00" }, { "name": "CVE-2022-41222", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:26+00:00", "updated_at": "2022-11-17T11:03:26+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:38+00:00", "updated_at": "2022-11-17T11:03:38+00:00" }, { "name": "CVE-2022-20422", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:03:54+00:00", "updated_at": "2022-11-17T11:03:54+00:00" }, { "name": "CVE-2022-3028", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:04:27+00:00", "updated_at": "2022-11-17T11:04:27+00:00" }, { "name": "CVE-2022-3625", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:07:48+00:00", "updated_at": "2022-11-17T11:07:48+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:08:08+00:00", "updated_at": "2022-11-17T11:08:08+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2022-11-17T11:08:56+00:00", "updated_at": "2022-11-17T11:08:56+00:00" }, { "name": "CVE-2022-3633", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-04-21T09:27:39+00:00", "updated_at": "2023-04-21T09:27:39+00:00" }, { "name": "CVE-2022-3629", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-04-21T09:28:19+00:00", "updated_at": "2023-04-21T09:28:19+00:00" }, { "name": "CVE-2023-1095", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-04-21T09:30:58+00:00", "updated_at": "2023-04-21T09:30:58+00:00" }, { "name": "CVE-2023-2513", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "6546a7892b87af76ec865737f62f2306a554f69a53c35ab56528e4e0fc53ff61", "name": "linux-libc-dev", "version": "5.4.0-132.148", "filename": "linux-libc-dev_5.4.0-132.148_amd64.deb" }, "created_at": "2023-06-06T10:18:45+00:00", "updated_at": "2023-06-06T10:18:45+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-10-18T19:11:07+00:00", "updated_at": "2022-10-19T17:03:32+00:00", "deleted_at": null }