1ccc338eeb258e8b4517ec56edc817fc3c097d6a4b7b75d4d0e31f5189cc1465
e35f34069843b96020ff5f9341fe864bda8900a3
3374eaa8eff63248e206e7a6d2823721
5.4.0-1044.45
linux-gkeop-tools-5.4.0-1044_5.4.0-1044.45_amd64.deb
24435
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1044 /usr/lib/libcpupower.so.5.4.0-1044 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1044/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1044/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1044/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1044/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1044/perf | 21837616 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1044/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1044/bpftool | 552632 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1044/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1044/x86_energy_perf_policy | 38544 | 0 |
{ "sha256": "1ccc338eeb258e8b4517ec56edc817fc3c097d6a4b7b75d4d0e31f5189cc1465", "sha1": "e35f34069843b96020ff5f9341fe864bda8900a3", "md5": "3374eaa8eff63248e206e7a6d2823721", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1044", "filename": "linux-gkeop-tools-5.4.0-1044_5.4.0-1044.45_amd64.deb", "size": 24435, "description": "Linux kernel version specific tools for version 5.4.0-1044\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1044 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1044-<flavour>.", "url": null, "version": "5.4.0-1044.45", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1044", "sha256": "760df16d13e13c5f5993c35ac03d3026298cf9fc6e177c54a404e2cfa8fc0ec5", "sha1": "bffe8153fcec0b0405380534401de7ed26503d6a", "md5": "7337e5a00e5911aa355130ee61a31d7a", "name": "libcpupower.so.5.4.0-1044", "size": 97800, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/usbip", "sha256": "438866a20259658aeac3c69d6a1d8a63d17921a1d5fa82fa47083fe903b3fd20", "sha1": "4f8696596d300d8f9af719481c1ec99635d49f8d", "md5": "b03e24d8a0aa829c94ffee03a8c73456", "name": "usbip", "size": 300512, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/libperf-jvmti.so", "sha256": "984d046ac2f88f9bd97bedb5f8bd200719b952389c38bb3aa1d06ce1f0e02241", "sha1": "e284f5f5275608e661d266a6e3b19f28771c14c0", "md5": "50f2bf50ea21ae4ec1871220e1aedda5", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/turbostat", "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785", "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846", "md5": "3dca491f8622de5e10e9125e01b85e3e", "name": "turbostat", "size": 134424, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/cpupower", "sha256": "04ee2b2c8f1bad1154fe19b9214a12db33ec73c08c861632d7e3cbb8c593a019", "sha1": "3425d73a194a18cd9ced63450c8e1a650ae844f1", "md5": "5db4382f3ba63c03c4eef0e1a6de07d6", "name": "cpupower", "size": 337952, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/perf", "sha256": "4d93fc16ef7f4a2dd3f8e8d96da521f9809b2919363f777c60c2d41c5e9454c2", "sha1": "df369c695f582ec163ddf8dbb9205d929ba2f68b", "md5": "091929487e085aa86940461b3bf0d96a", "name": "perf", "size": 21837616, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/acpidbg", "sha256": "c733ad92fd4b3a093b8f0883d20cc2cf3c6ff31e2fda56689570850d11514bec", "sha1": "6ebd8ceed98d37e6becea9ad63adf0526217a5ba", "md5": "44237e56c2c6214eee632420b456a434", "name": "acpidbg", "size": 914040, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/bpftool", "sha256": "156fbc698231c0c95e0b58e66b83b6c7bbc103cdec5db6415085e6cdffb05da9", "sha1": "222ba6bc9061d8c50bea68c7040ddd1db4ca0da1", "md5": "bfa7b334d0330b4060a51d34810661de", "name": "bpftool", "size": 552632, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/usbipd", "sha256": "82fc33fae7ecb2cc0640e2d4c068fbfb440df683988734835be92d1479a331bc", "sha1": "b93ee06ce75df7b0c1c36db40775623a55c4f8dd", "md5": "be7b4e04d0eb133fe0b893813d268221", "name": "usbipd", "size": 297128, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1044/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3752956, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-01T02:47:53+00:00", "updated_at": "2022-06-01T02:47:53+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3202", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-02-18T11:06:17+00:00", "updated_at": "2023-02-18T11:06:17+00:00" }, { "name": "CVE-2022-23039", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T01:47:35+00:00", "updated_at": "2022-06-09T01:47:35+00:00" }, { "name": "CVE-2022-23038", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:05:28+00:00", "updated_at": "2022-06-09T02:05:28+00:00" }, { "name": "CVE-2022-23036", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:05:51+00:00", "updated_at": "2022-06-09T02:05:51+00:00" }, { "name": "CVE-2022-23037", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:08:42+00:00", "updated_at": "2022-06-09T02:08:42+00:00" }, { "name": "CVE-2022-28356", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:09:36+00:00", "updated_at": "2022-06-09T02:09:36+00:00" }, { "name": "CVE-2021-3772", "risk": 65, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:13:33+00:00", "updated_at": "2022-06-09T02:13:33+00:00" }, { "name": "CVE-2022-1966", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:15:27+00:00", "updated_at": "2022-06-09T02:15:27+00:00" }, { "name": "CVE-2022-23040", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:17:12+00:00", "updated_at": "2022-06-09T02:17:12+00:00" }, { "name": "CVE-2022-1158", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:17:25+00:00", "updated_at": "2022-06-09T02:17:25+00:00" }, { "name": "CVE-2022-21499", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:18:37+00:00", "updated_at": "2022-06-09T02:18:37+00:00" }, { "name": "CVE-2022-23041", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:20:47+00:00", "updated_at": "2022-06-09T02:20:47+00:00" }, { "name": "CVE-2022-28389", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:36:18+00:00", "updated_at": "2022-06-09T02:36:18+00:00" }, { "name": "CVE-2022-23042", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:41:49+00:00", "updated_at": "2022-06-09T02:41:49+00:00" }, { "name": "CVE-2021-4197", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:47:22+00:00", "updated_at": "2022-06-09T02:47:22+00:00" }, { "name": "CVE-2022-1198", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:49:05+00:00", "updated_at": "2022-06-09T02:49:05+00:00" }, { "name": "CVE-2022-1516", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:50:01+00:00", "updated_at": "2022-06-09T02:50:01+00:00" }, { "name": "CVE-2022-26966", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:58:07+00:00", "updated_at": "2022-06-09T02:58:07+00:00" }, { "name": "CVE-2022-24958", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T02:58:32+00:00", "updated_at": "2022-06-09T02:58:32+00:00" }, { "name": "CVE-2022-1011", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T03:03:55+00:00", "updated_at": "2022-06-09T03:03:55+00:00" }, { "name": "CVE-2022-1353", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T03:04:13+00:00", "updated_at": "2022-06-09T03:04:13+00:00" }, { "name": "CVE-2022-28390", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-06-09T03:09:02+00:00", "updated_at": "2022-06-09T03:09:02+00:00" }, { "name": "CVE-2022-1195", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-14T02:51:26+00:00", "updated_at": "2022-07-14T02:51:26+00:00" }, { "name": "CVE-2022-1199", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-14T02:52:57+00:00", "updated_at": "2022-07-14T02:52:57+00:00" }, { "name": "CVE-2022-1204", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-14T02:53:35+00:00", "updated_at": "2022-07-14T02:53:35+00:00" }, { "name": "CVE-2022-1205", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-14T02:54:57+00:00", "updated_at": "2022-07-14T02:54:57+00:00" }, { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-14T02:58:35+00:00", "updated_at": "2022-07-14T02:58:35+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-14T02:59:09+00:00", "updated_at": "2022-07-14T02:59:09+00:00" }, { "name": "CVE-2022-2380", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-08-14T02:19:26+00:00", "updated_at": "2022-08-14T02:19:26+00:00" }, { "name": "CVE-2022-28388", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-08-14T02:21:41+00:00", "updated_at": "2022-08-14T02:21:41+00:00" }, { "name": "CVE-2022-25375", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-08-14T02:24:26+00:00", "updated_at": "2022-08-14T02:24:26+00:00" }, { "name": "CVE-2022-32250", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2022-08-14T02:30:39+00:00", "updated_at": "2022-08-14T02:30:39+00:00" }, { "name": "CVE-2022-2639", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2023-02-18T11:25:00+00:00", "updated_at": "2023-02-18T11:25:00+00:00" }, { "name": "CVE-2022-3239", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-02-18T11:33:04+00:00", "updated_at": "2023-02-18T11:33:04+00:00" }, { "name": "CVE-2022-41858", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2023-02-18T11:42:53+00:00", "updated_at": "2023-02-18T11:42:53+00:00" }, { "name": "CVE-2022-20368", "risk": 98, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-02-18T11:53:29+00:00", "updated_at": "2023-02-18T11:53:29+00:00" }, { "name": "CVE-2022-20423", "risk": 46, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-02-18T12:01:56+00:00", "updated_at": "2023-02-18T12:01:56+00:00" }, { "name": "CVE-2022-2977", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-02-18T12:06:23+00:00", "updated_at": "2023-02-18T12:06:23+00:00" }, { "name": "CVE-2022-3107", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-03-07T12:24:38+00:00", "updated_at": "2023-03-07T12:24:38+00:00" }, { "name": "CVE-2022-2991", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2023-04-21T09:38:56+00:00", "updated_at": "2023-04-21T09:38:56+00:00" }, { "name": "CVE-2022-3111", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-04-21T09:39:18+00:00", "updated_at": "2023-04-21T09:39:18+00:00" }, { "name": "CVE-2023-1637", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1046.48", "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb" }, "created_at": "2023-04-21T09:39:50+00:00", "updated_at": "2023-04-21T09:39:50+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 98, "malicious": 0, "created_at": "2022-05-31T14:31:09+00:00", "updated_at": "2022-06-01T01:47:52+00:00", "deleted_at": null }