Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (45)

linux-image-unsigned-5.15.0-54-generic

Hashes
Linux kernel image for version 5.15.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.15.0 on 64 bit x86 SMP. Supports Generic processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-generic meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 6996ba97d6fe0528f5c2f73b5a92012684264958304d5ed8e94eb36b3323f777
  • SHA1: bdd54cc9db7d1faa6067dd397f7d27c8abe723bc
  • MD5: 7806eb2276de5f8c3504e92872c89894
Information
  • Version: 5.15.0-54.60
  • Filename: linux-image-unsigned-5.15.0-54-generic_5.15.0-54.60_amd64.deb
  • Size: 11725
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.15.0-54-generic

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-doc
5.15.0-56.62
CVE-2022-439458USN
linux-doc
5.15.0-56.62
CVE-2022-4270355USN
linux-doc
5.15.0-56.62
CVE-2022-356671USN
linux-doc
5.15.0-56.62
CVE-2022-356480USN
linux-doc
5.15.0-56.62
CVE-2022-356771USN
linux-doc
5.15.0-56.62
CVE-2022-36218USN
linux-doc
5.15.0-56.62
CVE-2022-352475USN
linux-doc
5.15.0-56.62
CVE-2022-356580USN
linux-doc
5.15.0-56.62
CVE-2022-352475USN
linux-libc-dev
5.15.0-56.62
CVE-2022-4270355USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356580USN
linux-libc-dev
5.15.0-56.62
CVE-2022-36218USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356771USN
linux-libc-dev
5.15.0-56.62
CVE-2022-359475USN
linux-libc-dev
5.15.0-56.62
CVE-2022-439458USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356671USN
linux-libc-dev
5.15.0-56.62
CVE-2022-356480USN
linux-libc-dev
5.15.0-56.62
CVE-2022-36218USN
linux-tools-host
5.15.0-56.62
CVE-2022-356480USN
linux-tools-host
5.15.0-56.62
CVE-2022-359475USN
linux-tools-host
5.15.0-56.62
CVE-2022-352475USN
linux-tools-host
5.15.0-56.62
CVE-2022-356771USN
linux-tools-host
5.15.0-56.62
CVE-2022-356671USN
linux-tools-host
5.15.0-56.62
CVE-2022-356580USN
linux-tools-host
5.15.0-56.62
CVE-2022-439458USN
linux-tools-host
5.15.0-56.62
CVE-2022-4270355USN
linux-tools-host
5.15.0-56.62
CVE-2022-364910USN
linux-libc-dev
5.15.0-57.63
CVE-2022-017155USN
linux-libc-dev
5.15.0-57.63
CVE-2022-266353USN
linux-libc-dev
5.15.0-57.63
CVE-2022-36465USN
linux-libc-dev
5.15.0-57.63
CVE-2022-306155USN
linux-libc-dev
5.15.0-57.63
CVE-2022-3918847USN
linux-libc-dev
5.15.0-57.63
CVE-2022-358655USN
linux-libc-dev
5.15.0-57.63
CVE-2022-437508USN
linux-libc-dev
5.15.0-57.63
CVE-2022-2042178USN
linux-libc-dev
5.15.0-57.63
CVE-2022-4030747USN
linux-libc-dev
5.15.0-57.63
CVE-2022-3984278USN
linux-libc-dev
5.15.0-57.63
CVE-2022-330347USN
linux-libc-dev
5.15.0-57.63
CVE-2022-40958USN
linux-libc-dev
5.15.0-57.63
CVE-2022-46620USN
linux-libc-dev
5.15.0-57.63
CVE-2022-424320USN
linux-libc-dev
5.15.0-57.63
CVE-2022-230878USN
linux-libc-dev
5.15.0-57.63
CVE-2022-39035USN
linux-libc-dev
5.15.0-57.63
CVE-2023-28600USN
linux-libc-dev
5.15.0-57.63

Raw Object

{
  "sha256": "6996ba97d6fe0528f5c2f73b5a92012684264958304d5ed8e94eb36b3323f777",
  "sha1": "bdd54cc9db7d1faa6067dd397f7d27c8abe723bc",
  "md5": "7806eb2276de5f8c3504e92872c89894",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.15.0-54-generic",
  "filename": "linux-image-unsigned-5.15.0-54-generic_5.15.0-54.60_amd64.deb",
  "size": 11725,
  "description": "Linux kernel image for version 5.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.15.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.15.0-54.60",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.15.0-54-generic",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:27:37+00:00",
      "updated_at": "2022-12-02T12:27:37+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:37:57+00:00",
      "updated_at": "2022-12-02T12:37:57+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:39:48+00:00",
      "updated_at": "2022-12-02T12:39:48+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:41:44+00:00",
      "updated_at": "2022-12-02T12:41:44+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:42:30+00:00",
      "updated_at": "2022-12-02T12:42:30+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:43:18+00:00",
      "updated_at": "2022-12-02T12:43:18+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:44:21+00:00",
      "updated_at": "2022-12-02T12:44:21+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:45:48+00:00",
      "updated_at": "2022-12-02T12:45:48+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5747abeebe30657d4be4ae6702a8a9eb34976cb5163f8f61949937ad10136905",
        "name": "linux-doc",
        "version": "5.15.0-56.62",
        "filename": "linux-doc_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-02T12:46:27+00:00",
      "updated_at": "2022-12-02T12:46:27+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:39:06+00:00",
      "updated_at": "2022-12-03T12:39:06+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:41:07+00:00",
      "updated_at": "2022-12-03T12:41:07+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:41:45+00:00",
      "updated_at": "2022-12-03T12:41:45+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:42:50+00:00",
      "updated_at": "2022-12-03T12:42:50+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:43:28+00:00",
      "updated_at": "2022-12-03T12:43:28+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:44:23+00:00",
      "updated_at": "2022-12-03T12:44:23+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:44:41+00:00",
      "updated_at": "2022-12-03T12:44:41+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:45:06+00:00",
      "updated_at": "2022-12-03T12:45:06+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544",
        "name": "linux-libc-dev",
        "version": "5.15.0-56.62",
        "filename": "linux-libc-dev_5.15.0-56.62_i386.deb"
      },
      "created_at": "2022-12-03T12:45:44+00:00",
      "updated_at": "2022-12-03T12:45:44+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T10:46:03+00:00",
      "updated_at": "2022-12-12T10:46:03+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T10:51:10+00:00",
      "updated_at": "2022-12-12T10:51:10+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T11:05:26+00:00",
      "updated_at": "2022-12-12T11:05:26+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T11:22:36+00:00",
      "updated_at": "2022-12-12T11:22:36+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T11:49:44+00:00",
      "updated_at": "2022-12-12T11:49:44+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T12:10:31+00:00",
      "updated_at": "2022-12-12T12:10:31+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T12:15:47+00:00",
      "updated_at": "2022-12-12T12:15:47+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T12:17:30+00:00",
      "updated_at": "2022-12-12T12:17:30+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aa3646845eb468bbb69b5ab204222f8c5d1ab5427f8263d4ad48de8d7e847f84",
        "name": "linux-tools-host",
        "version": "5.15.0-56.62",
        "filename": "linux-tools-host_5.15.0-56.62_all.deb"
      },
      "created_at": "2022-12-12T12:23:10+00:00",
      "updated_at": "2022-12-12T12:23:10+00:00"
    },
    {
      "name": "CVE-2022-3649",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T11:41:22+00:00",
      "updated_at": "2023-01-07T11:41:22+00:00"
    },
    {
      "name": "CVE-2022-0171",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T11:55:33+00:00",
      "updated_at": "2023-01-07T11:55:33+00:00"
    },
    {
      "name": "CVE-2022-2663",
      "risk": 53,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T11:58:22+00:00",
      "updated_at": "2023-01-07T11:58:22+00:00"
    },
    {
      "name": "CVE-2022-3646",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T12:24:04+00:00",
      "updated_at": "2023-01-07T12:24:04+00:00"
    },
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T13:01:09+00:00",
      "updated_at": "2023-01-07T13:01:09+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T13:44:05+00:00",
      "updated_at": "2023-01-07T13:44:05+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T14:23:14+00:00",
      "updated_at": "2023-01-07T14:23:14+00:00"
    },
    {
      "name": "CVE-2022-43750",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T14:47:31+00:00",
      "updated_at": "2023-01-07T14:47:31+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T14:50:05+00:00",
      "updated_at": "2023-01-07T14:50:05+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T15:08:38+00:00",
      "updated_at": "2023-01-07T15:08:38+00:00"
    },
    {
      "name": "CVE-2022-39842",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T15:34:28+00:00",
      "updated_at": "2023-01-07T15:34:28+00:00"
    },
    {
      "name": "CVE-2022-3303",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T15:37:03+00:00",
      "updated_at": "2023-01-07T15:37:03+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-01-07T15:37:30+00:00",
      "updated_at": "2023-01-07T15:37:30+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-02-18T11:46:02+00:00",
      "updated_at": "2023-02-18T11:46:02+00:00"
    },
    {
      "name": "CVE-2022-42432",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-04-21T09:24:11+00:00",
      "updated_at": "2023-04-21T09:24:11+00:00"
    },
    {
      "name": "CVE-2022-2308",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-04-21T09:29:07+00:00",
      "updated_at": "2023-04-21T09:29:07+00:00"
    },
    {
      "name": "CVE-2022-3903",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-04-21T09:37:08+00:00",
      "updated_at": "2023-04-21T09:37:08+00:00"
    },
    {
      "name": "CVE-2023-2860",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2",
        "name": "linux-libc-dev",
        "version": "5.15.0-57.63",
        "filename": "linux-libc-dev_5.15.0-57.63_i386.deb"
      },
      "created_at": "2023-07-12T10:07:46+00:00",
      "updated_at": "2023-07-12T10:07:46+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 98,
  "malicious": 0,
  "created_at": "2022-11-15T13:59:03+00:00",
  "updated_at": "2022-11-17T10:20:26+00:00",
  "deleted_at": null
}