Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (42)

linux-gkeop-tools-5.4.0-1044

Hashes
Linux kernel version specific tools for version 5.4.0-1044 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-1044 on 64 bit x86. You probably want to install linux-tools-5.4.0-1044-<flavour>.
  • SHA256: 1ccc338eeb258e8b4517ec56edc817fc3c097d6a4b7b75d4d0e31f5189cc1465
  • SHA1: e35f34069843b96020ff5f9341fe864bda8900a3
  • MD5: 3374eaa8eff63248e206e7a6d2823721
Information
  • Version: 5.4.0-1044.45
  • Filename: linux-gkeop-tools-5.4.0-1044_5.4.0-1044.45_amd64.deb
  • Size: 24435
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.4.0-1044
/usr/lib/libcpupower.so.5.4.0-1044
978000
usbip
/usr/lib/linux-gkeop-tools-5.4.0-1044/usbip
3005120
libperf-jvmti.so
/usr/lib/linux-gkeop-tools-5.4.0-1044/libperf-jvmti.so
2432640
turbostat
/usr/lib/linux-gkeop-tools-5.4.0-1044/turbostat
1344240
cpupower
/usr/lib/linux-gkeop-tools-5.4.0-1044/cpupower
3379520
perf
/usr/lib/linux-gkeop-tools-5.4.0-1044/perf
218376160
acpidbg
/usr/lib/linux-gkeop-tools-5.4.0-1044/acpidbg
9140400
bpftool
/usr/lib/linux-gkeop-tools-5.4.0-1044/bpftool
5526320
usbipd
/usr/lib/linux-gkeop-tools-5.4.0-1044/usbipd
2971280
x86_energy_perf_policy
/usr/lib/linux-gkeop-tools-5.4.0-1044/x86_energy_perf_policy
385440

Vulnerabilities

NameRiskSourceFixed
CVE-2022-320271USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303970USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303870USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303670USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303770USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2835675USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2021-377265USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-19660USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2304070USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-11580USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2149967USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2304170USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2838978USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2304270USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2021-419778USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-11980USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-151655USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2696655USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2495878USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-101178USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-13530USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2839078USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-11950USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-11990USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-120455USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-120547USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-339810USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-17890USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-238055USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2838878USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-2537555USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-322500USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-263978USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-323978USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-418587USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-2036898USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2042346USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-297778USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-31076USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-299167USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-31116USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2023-16376USN
linux-gkeop-source-5.4.0
5.4.0-1046.48

Raw Object

{
  "sha256": "1ccc338eeb258e8b4517ec56edc817fc3c097d6a4b7b75d4d0e31f5189cc1465",
  "sha1": "e35f34069843b96020ff5f9341fe864bda8900a3",
  "md5": "3374eaa8eff63248e206e7a6d2823721",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gkeop-tools-5.4.0-1044",
  "filename": "linux-gkeop-tools-5.4.0-1044_5.4.0-1044.45_amd64.deb",
  "size": 24435,
  "description": "Linux kernel version specific tools for version 5.4.0-1044\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1044 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1044-<flavour>.",
  "url": null,
  "version": "5.4.0-1044.45",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-1044",
      "sha256": "760df16d13e13c5f5993c35ac03d3026298cf9fc6e177c54a404e2cfa8fc0ec5",
      "sha1": "bffe8153fcec0b0405380534401de7ed26503d6a",
      "md5": "7337e5a00e5911aa355130ee61a31d7a",
      "name": "libcpupower.so.5.4.0-1044",
      "size": 97800,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/usbip",
      "sha256": "438866a20259658aeac3c69d6a1d8a63d17921a1d5fa82fa47083fe903b3fd20",
      "sha1": "4f8696596d300d8f9af719481c1ec99635d49f8d",
      "md5": "b03e24d8a0aa829c94ffee03a8c73456",
      "name": "usbip",
      "size": 300512,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/libperf-jvmti.so",
      "sha256": "984d046ac2f88f9bd97bedb5f8bd200719b952389c38bb3aa1d06ce1f0e02241",
      "sha1": "e284f5f5275608e661d266a6e3b19f28771c14c0",
      "md5": "50f2bf50ea21ae4ec1871220e1aedda5",
      "name": "libperf-jvmti.so",
      "size": 243264,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/turbostat",
      "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785",
      "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846",
      "md5": "3dca491f8622de5e10e9125e01b85e3e",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/cpupower",
      "sha256": "04ee2b2c8f1bad1154fe19b9214a12db33ec73c08c861632d7e3cbb8c593a019",
      "sha1": "3425d73a194a18cd9ced63450c8e1a650ae844f1",
      "md5": "5db4382f3ba63c03c4eef0e1a6de07d6",
      "name": "cpupower",
      "size": 337952,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/perf",
      "sha256": "4d93fc16ef7f4a2dd3f8e8d96da521f9809b2919363f777c60c2d41c5e9454c2",
      "sha1": "df369c695f582ec163ddf8dbb9205d929ba2f68b",
      "md5": "091929487e085aa86940461b3bf0d96a",
      "name": "perf",
      "size": 21837616,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/acpidbg",
      "sha256": "c733ad92fd4b3a093b8f0883d20cc2cf3c6ff31e2fda56689570850d11514bec",
      "sha1": "6ebd8ceed98d37e6becea9ad63adf0526217a5ba",
      "md5": "44237e56c2c6214eee632420b456a434",
      "name": "acpidbg",
      "size": 914040,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/bpftool",
      "sha256": "156fbc698231c0c95e0b58e66b83b6c7bbc103cdec5db6415085e6cdffb05da9",
      "sha1": "222ba6bc9061d8c50bea68c7040ddd1db4ca0da1",
      "md5": "bfa7b334d0330b4060a51d34810661de",
      "name": "bpftool",
      "size": 552632,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/usbipd",
      "sha256": "82fc33fae7ecb2cc0640e2d4c068fbfb440df683988734835be92d1479a331bc",
      "sha1": "b93ee06ce75df7b0c1c36db40775623a55c4f8dd",
      "md5": "be7b4e04d0eb133fe0b893813d268221",
      "name": "usbipd",
      "size": 297128,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 3752956,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-01T02:47:53+00:00",
      "updated_at": "2022-06-01T02:47:53+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3202",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T11:06:17+00:00",
      "updated_at": "2023-02-18T11:06:17+00:00"
    },
    {
      "name": "CVE-2022-23039",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T01:47:35+00:00",
      "updated_at": "2022-06-09T01:47:35+00:00"
    },
    {
      "name": "CVE-2022-23038",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:05:28+00:00",
      "updated_at": "2022-06-09T02:05:28+00:00"
    },
    {
      "name": "CVE-2022-23036",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:05:51+00:00",
      "updated_at": "2022-06-09T02:05:51+00:00"
    },
    {
      "name": "CVE-2022-23037",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:08:42+00:00",
      "updated_at": "2022-06-09T02:08:42+00:00"
    },
    {
      "name": "CVE-2022-28356",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:09:36+00:00",
      "updated_at": "2022-06-09T02:09:36+00:00"
    },
    {
      "name": "CVE-2021-3772",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:13:33+00:00",
      "updated_at": "2022-06-09T02:13:33+00:00"
    },
    {
      "name": "CVE-2022-1966",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:15:27+00:00",
      "updated_at": "2022-06-09T02:15:27+00:00"
    },
    {
      "name": "CVE-2022-23040",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:17:12+00:00",
      "updated_at": "2022-06-09T02:17:12+00:00"
    },
    {
      "name": "CVE-2022-1158",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:17:25+00:00",
      "updated_at": "2022-06-09T02:17:25+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:18:37+00:00",
      "updated_at": "2022-06-09T02:18:37+00:00"
    },
    {
      "name": "CVE-2022-23041",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:20:47+00:00",
      "updated_at": "2022-06-09T02:20:47+00:00"
    },
    {
      "name": "CVE-2022-28389",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:36:18+00:00",
      "updated_at": "2022-06-09T02:36:18+00:00"
    },
    {
      "name": "CVE-2022-23042",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:41:49+00:00",
      "updated_at": "2022-06-09T02:41:49+00:00"
    },
    {
      "name": "CVE-2021-4197",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:47:22+00:00",
      "updated_at": "2022-06-09T02:47:22+00:00"
    },
    {
      "name": "CVE-2022-1198",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:49:05+00:00",
      "updated_at": "2022-06-09T02:49:05+00:00"
    },
    {
      "name": "CVE-2022-1516",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:50:01+00:00",
      "updated_at": "2022-06-09T02:50:01+00:00"
    },
    {
      "name": "CVE-2022-26966",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:58:07+00:00",
      "updated_at": "2022-06-09T02:58:07+00:00"
    },
    {
      "name": "CVE-2022-24958",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:58:32+00:00",
      "updated_at": "2022-06-09T02:58:32+00:00"
    },
    {
      "name": "CVE-2022-1011",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T03:03:55+00:00",
      "updated_at": "2022-06-09T03:03:55+00:00"
    },
    {
      "name": "CVE-2022-1353",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T03:04:13+00:00",
      "updated_at": "2022-06-09T03:04:13+00:00"
    },
    {
      "name": "CVE-2022-28390",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T03:09:02+00:00",
      "updated_at": "2022-06-09T03:09:02+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-14T02:51:26+00:00",
      "updated_at": "2022-07-14T02:51:26+00:00"
    },
    {
      "name": "CVE-2022-1199",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-14T02:52:57+00:00",
      "updated_at": "2022-07-14T02:52:57+00:00"
    },
    {
      "name": "CVE-2022-1204",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-14T02:53:35+00:00",
      "updated_at": "2022-07-14T02:53:35+00:00"
    },
    {
      "name": "CVE-2022-1205",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-14T02:54:57+00:00",
      "updated_at": "2022-07-14T02:54:57+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-14T02:58:35+00:00",
      "updated_at": "2022-07-14T02:58:35+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-14T02:59:09+00:00",
      "updated_at": "2022-07-14T02:59:09+00:00"
    },
    {
      "name": "CVE-2022-2380",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-08-14T02:19:26+00:00",
      "updated_at": "2022-08-14T02:19:26+00:00"
    },
    {
      "name": "CVE-2022-28388",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-08-14T02:21:41+00:00",
      "updated_at": "2022-08-14T02:21:41+00:00"
    },
    {
      "name": "CVE-2022-25375",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-08-14T02:24:26+00:00",
      "updated_at": "2022-08-14T02:24:26+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-08-14T02:30:39+00:00",
      "updated_at": "2022-08-14T02:30:39+00:00"
    },
    {
      "name": "CVE-2022-2639",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2023-02-18T11:25:00+00:00",
      "updated_at": "2023-02-18T11:25:00+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T11:33:04+00:00",
      "updated_at": "2023-02-18T11:33:04+00:00"
    },
    {
      "name": "CVE-2022-41858",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2023-02-18T11:42:53+00:00",
      "updated_at": "2023-02-18T11:42:53+00:00"
    },
    {
      "name": "CVE-2022-20368",
      "risk": 98,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T11:53:29+00:00",
      "updated_at": "2023-02-18T11:53:29+00:00"
    },
    {
      "name": "CVE-2022-20423",
      "risk": 46,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T12:01:56+00:00",
      "updated_at": "2023-02-18T12:01:56+00:00"
    },
    {
      "name": "CVE-2022-2977",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T12:06:23+00:00",
      "updated_at": "2023-02-18T12:06:23+00:00"
    },
    {
      "name": "CVE-2022-3107",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-03-07T12:24:38+00:00",
      "updated_at": "2023-03-07T12:24:38+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2023-04-21T09:38:56+00:00",
      "updated_at": "2023-04-21T09:38:56+00:00"
    },
    {
      "name": "CVE-2022-3111",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-04-21T09:39:18+00:00",
      "updated_at": "2023-04-21T09:39:18+00:00"
    },
    {
      "name": "CVE-2023-1637",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-04-21T09:39:50+00:00",
      "updated_at": "2023-04-21T09:39:50+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 98,
  "malicious": 0,
  "created_at": "2022-05-31T14:31:09+00:00",
  "updated_at": "2022-06-01T01:47:52+00:00",
  "deleted_at": null
}