Zercurity data services
  • Summary
  • Applications (6)
  • Packages (0)
  • Vulnerabilities (36)

linux-modules-iwlwifi-5.15.0-54-generic

Hashes
Linux kernel iwlwifi modules for version 5.15.0-54 This package provides the Linux kernel iwlwifi modules for version 5.15.0-54. You likely do not want to install this package directly. Instead, install the one of the linux-modules-iwlwifi-generic* meta-packages, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 549e275c43d398b48418f57946aa55a749ff400a8b55bab712ccb0a919d63331
  • SHA1: cf067fa0025d32d97c86aa2d9fab34a3aeb8d52b
  • MD5: 90cfa5c6ebf9abe389c3c62611207c29
Information
  • Version: 5.15.0-54.60
  • Filename: linux-modules-iwlwifi-5.15.0-54-generic_5.15.0-54.60_amd64.deb
  • Size: 6273
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: linux-image-5.15.0-54-generic | linux-image-unsigned-5.15.0-54-generic

Applications

NameTypeArchSizeRisk
cfg80211.ko
/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/cfg80211.ko
16054090
iwlwifi.ko
/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlwifi.ko
9489930
compat.ko
/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/compat.ko
85290
mac80211.ko
/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/mac80211.ko
20529530
iwlmvm.ko
/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlmvm.ko
12187370
iwlxvt.ko
/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlxvt.ko
1284730

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-libc-dev
5.15.0-56.62
CVE-2022-439458USN
linux-libc-dev
5.15.0-56.62
CVE-2022-4270355USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356671USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356480USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356771USN
linux-libc-dev
5.15.0-56.62
CVE-2022-36218USN
linux-libc-dev
5.15.0-56.62
CVE-2022-352475USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356580USN
linux-libc-dev
5.15.0-56.62
CVE-2022-352475USN
linux-libc-dev
5.15.0-56.62
CVE-2022-4270355USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356580USN
linux-libc-dev
5.15.0-56.62
CVE-2022-36218USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356771USN
linux-libc-dev
5.15.0-56.62
CVE-2022-359475USN
linux-libc-dev
5.15.0-56.62
CVE-2022-439458USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356671USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356480USN
linux-libc-dev
5.15.0-56.62
CVE-2022-364910USN
linux-libc-dev
5.15.0-57.63
CVE-2022-017155USN
linux-libc-dev
5.15.0-57.63
CVE-2022-266353USN
linux-libc-dev
5.15.0-57.63
CVE-2022-36465USN
linux-libc-dev
5.15.0-57.63
CVE-2022-306155USN
linux-libc-dev
5.15.0-57.63
CVE-2022-3918847USN
linux-libc-dev
5.15.0-57.63
CVE-2022-358655USN
linux-libc-dev
5.15.0-57.63
CVE-2022-437508USN
linux-libc-dev
5.15.0-57.63
CVE-2022-2042178USN
linux-libc-dev
5.15.0-57.63
CVE-2022-4030747USN
linux-libc-dev
5.15.0-57.63
CVE-2022-3984278USN
linux-libc-dev
5.15.0-57.63
CVE-2022-330347USN
linux-libc-dev
5.15.0-57.63
CVE-2022-40958USN
linux-libc-dev
5.15.0-57.63
CVE-2022-46620USN
linux-libc-dev
5.15.0-57.63
CVE-2022-424320USN
linux-libc-dev
5.15.0-57.63
CVE-2022-230878USN
linux-libc-dev
5.15.0-57.63
CVE-2022-39035USN
linux-libc-dev
5.15.0-57.63
CVE-2023-28600USN
linux-libc-dev
5.15.0-57.63

Raw Object

{
  "sha256": "549e275c43d398b48418f57946aa55a749ff400a8b55bab712ccb0a919d63331",
  "sha1": "cf067fa0025d32d97c86aa2d9fab34a3aeb8d52b",
  "md5": "90cfa5c6ebf9abe389c3c62611207c29",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-modules-iwlwifi-5.15.0-54-generic",
  "filename": "linux-modules-iwlwifi-5.15.0-54-generic_5.15.0-54.60_amd64.deb",
  "size": 6273,
  "description": "Linux kernel iwlwifi modules for version 5.15.0-54\nThis package provides the Linux kernel iwlwifi modules for version\n5.15.0-54.\n\nYou likely do not want to install this package directly. Instead, install the\none of the linux-modules-iwlwifi-generic* meta-packages,\nwhich will ensure that upgrades work correctly, and that supporting packages are\nalso installed.",
  "url": null,
  "version": "5.15.0-54.60",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "linux-image-5.15.0-54-generic | linux-image-unsigned-5.15.0-54-generic",
  "applications": [
    {
      "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/cfg80211.ko",
      "sha256": "e6026c3368fa7f1ab40430a8cddc4da3d18381f4c505b7c7e60d4322badc194d",
      "sha1": "4e57bbe972638e8cc68e5b22d9df7e287df5556d",
      "md5": "572966a34996d683c1da88fbb4dc62cb",
      "name": "cfg80211.ko",
      "size": 1605409,
      "description": null,
      "package": 4907217,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-11-17T10:21:34+00:00",
      "updated_at": "2022-11-17T10:21:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlwifi.ko",
      "sha256": "7980f0fa4a0595cfcb9e5572815b53be6d48d32ca5043acccd8342de5167b1dd",
      "sha1": "ebd506e4ebc885c4bce324eefbfe7688adb08c0e",
      "md5": "8545ef9b59951a958241ecf3e238b4d8",
      "name": "iwlwifi.ko",
      "size": 948993,
      "description": null,
      "package": 4907217,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-11-17T10:21:34+00:00",
      "updated_at": "2022-11-17T10:21:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/compat.ko",
      "sha256": "fe3426fba1ed2a772e9b31f7f6ac6a135b2d6f9ffd59189498c7b71d3d648c5a",
      "sha1": "441c2b1032d960b03e907b2ce66d66191e24f7f3",
      "md5": "e2e4d44e6849c1dd8ea2457d6d4ebaaa",
      "name": "compat.ko",
      "size": 8529,
      "description": null,
      "package": 4907217,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-11-17T10:21:34+00:00",
      "updated_at": "2022-11-17T10:21:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/mac80211.ko",
      "sha256": "0cced7326d21035e2b3b32bfe0e8c0832eb56fe5125e866164744d7487264378",
      "sha1": "74d55a2b7923f4de0266cde0033552cbcc38c10d",
      "md5": "f67336a3814bbe75d8eac482ab2523bd",
      "name": "mac80211.ko",
      "size": 2052953,
      "description": null,
      "package": 4907217,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-11-17T10:21:34+00:00",
      "updated_at": "2022-11-17T10:21:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlmvm.ko",
      "sha256": "6952aa9b8417340876bf55e12e8ab690fdeca08bc0b0baa490cadf6266e1280e",
      "sha1": "9175a4b1b4da6ec463af264d31d60aba00a01d61",
      "md5": "888f4c01c2e800b37996e0915b70bbbc",
      "name": "iwlmvm.ko",
      "size": 1218737,
      "description": null,
      "package": 4907217,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-11-17T10:21:34+00:00",
      "updated_at": "2022-11-17T10:21:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlxvt.ko",
      "sha256": "a3065b6c4562d9a47b3375dc897aef4793c05f99cd0b994a4b896ea8ef63553e",
      "sha1": "bf0de7355f71ffef2a596825de8084732a3f000e",
      "md5": "da0dff82b9fbe7928d040b6474bc1c5b",
      "name": "iwlxvt.ko",
      "size": 128473,
      "description": null,
      "package": 4907217,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-11-17T10:21:34+00:00",
      "updated_at": "2022-11-17T10:21:34+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:27:37+00:00",
      "updated_at": "2022-12-02T12:27:37+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:37:57+00:00",
      "updated_at": "2022-12-02T12:37:57+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:39:49+00:00",
      "updated_at": "2022-12-02T12:39:49+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:41:44+00:00",
      "updated_at": "2022-12-02T12:41:44+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:42:30+00:00",
      "updated_at": "2022-12-02T12:42:30+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:43:18+00:00",
      "updated_at": "2022-12-02T12:43:18+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:44:22+00:00",
      "updated_at": "2022-12-02T12:44:22+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:45:48+00:00",
      "updated_at": "2022-12-02T12:45:48+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-02T12:46:27+00:00",
      "updated_at": "2022-12-02T12:46:27+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:39:05+00:00",
      "updated_at": "2022-12-03T12:39:05+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:41:06+00:00",
      "updated_at": "2022-12-03T12:41:06+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:41:45+00:00",
      "updated_at": "2022-12-03T12:41:45+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:42:50+00:00",
      "updated_at": "2022-12-03T12:42:50+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:43:27+00:00",
      "updated_at": "2022-12-03T12:43:27+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:44:22+00:00",
      "updated_at": "2022-12-03T12:44:22+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:44:40+00:00",
      "updated_at": "2022-12-03T12:44:40+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:45:05+00:00",
      "updated_at": "2022-12-03T12:45:05+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb"
      },
      "created_at": "2022-12-03T12:45:43+00:00",
      "updated_at": "2022-12-03T12:45:43+00:00"
    },
    {
      "name": "CVE-2022-3649",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T11:41:21+00:00",
      "updated_at": "2023-01-07T11:41:21+00:00"
    },
    {
      "name": "CVE-2022-0171",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T11:55:32+00:00",
      "updated_at": "2023-01-07T11:55:32+00:00"
    },
    {
      "name": "CVE-2022-2663",
      "risk": 53,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T11:58:21+00:00",
      "updated_at": "2023-01-07T11:58:21+00:00"
    },
    {
      "name": "CVE-2022-3646",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T12:24:03+00:00",
      "updated_at": "2023-01-07T12:24:03+00:00"
    },
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T13:01:08+00:00",
      "updated_at": "2023-01-07T13:01:08+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T13:44:05+00:00",
      "updated_at": "2023-01-07T13:44:05+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T14:23:14+00:00",
      "updated_at": "2023-01-07T14:23:14+00:00"
    },
    {
      "name": "CVE-2022-43750",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T14:47:30+00:00",
      "updated_at": "2023-01-07T14:47:30+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T14:50:04+00:00",
      "updated_at": "2023-01-07T14:50:04+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T15:08:37+00:00",
      "updated_at": "2023-01-07T15:08:37+00:00"
    },
    {
      "name": "CVE-2022-39842",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T15:34:27+00:00",
      "updated_at": "2023-01-07T15:34:27+00:00"
    },
    {
      "name": "CVE-2022-3303",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T15:37:02+00:00",
      "updated_at": "2023-01-07T15:37:02+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-01-07T15:37:29+00:00",
      "updated_at": "2023-01-07T15:37:29+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-02-18T11:46:01+00:00",
      "updated_at": "2023-02-18T11:46:01+00:00"
    },
    {
      "name": "CVE-2022-42432",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-04-21T09:24:11+00:00",
      "updated_at": "2023-04-21T09:24:11+00:00"
    },
    {
      "name": "CVE-2022-2308",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-04-21T09:29:06+00:00",
      "updated_at": "2023-04-21T09:29:06+00:00"
    },
    {
      "name": "CVE-2022-3903",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-04-21T09:37:07+00:00",
      "updated_at": "2023-04-21T09:37:07+00:00"
    },
    {
      "name": "CVE-2023-2860",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb"
      },
      "created_at": "2023-07-12T10:07:45+00:00",
      "updated_at": "2023-07-12T10:07:45+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 98,
  "malicious": 0,
  "created_at": "2022-11-15T13:59:05+00:00",
  "updated_at": "2022-11-17T10:21:34+00:00",
  "deleted_at": null
}