Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (24)

linux-gkeop-tools-5.4.0-1064

Hashes
Linux kernel version specific tools for version 5.4.0-1064 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-1064 on 64 bit x86. You probably want to install linux-tools-5.4.0-1064-<flavour>.
  • SHA256: 21374f0d428977d7503729e30967b348309ef47501853254fa4f07543e014d0e
  • SHA1: f5dc74f0aa284a43fa51ac7095f1df2ca9acbe8b
  • MD5: 2925ffbed25624e18e422e89ef30b2d7
Information
  • Version: 5.4.0-1064.68
  • Filename: linux-gkeop-tools-5.4.0-1064_5.4.0-1064.68_amd64.deb
  • Size: 24506
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.4.0-1064
/usr/lib/libcpupower.so.5.4.0-1064
978000
usbip
/usr/lib/linux-gkeop-tools-5.4.0-1064/usbip
3005120
libperf-jvmti.so
/usr/lib/linux-gkeop-tools-5.4.0-1064/libperf-jvmti.so
2432640
turbostat
/usr/lib/linux-gkeop-tools-5.4.0-1064/turbostat
1344240
cpupower
/usr/lib/linux-gkeop-tools-5.4.0-1064/cpupower
3379520
perf
/usr/lib/linux-gkeop-tools-5.4.0-1064/perf
218447840
acpidbg
/usr/lib/linux-gkeop-tools-5.4.0-1064/acpidbg
9140400
bpftool
/usr/lib/linux-gkeop-tools-5.4.0-1064/bpftool
5526960
usbipd
/usr/lib/linux-gkeop-tools-5.4.0-1064/usbipd
2971280
x86_energy_perf_policy
/usr/lib/linux-gkeop-tools-5.4.0-1064/x86_energy_perf_policy
385440

Vulnerabilities

NameRiskSourceFixed
CVE-2023-00450USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-343543USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-479296USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-04610USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-352125USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-423296USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-41390USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-475207USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-3628055USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-316955USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-34248USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-209388USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-02668USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-36238USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-03946USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-234550USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-354578USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-423286USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2022-4121855USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-234540USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-283280USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-266077USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-13820USN
linux-gkeop-source-5.4.0
5.4.0-1065.69
CVE-2023-21660USN
linux-gkeop-source-5.4.0
5.4.0-1065.69

Raw Object

{
  "sha256": "21374f0d428977d7503729e30967b348309ef47501853254fa4f07543e014d0e",
  "sha1": "f5dc74f0aa284a43fa51ac7095f1df2ca9acbe8b",
  "md5": "2925ffbed25624e18e422e89ef30b2d7",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gkeop-tools-5.4.0-1064",
  "filename": "linux-gkeop-tools-5.4.0-1064_5.4.0-1064.68_amd64.deb",
  "size": 24506,
  "description": "Linux kernel version specific tools for version 5.4.0-1064\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1064 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1064-<flavour>.",
  "url": null,
  "version": "5.4.0-1064.68",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-1064",
      "sha256": "3c7c60748e58d78134e0d28fd07f0e0b6708d7dc3f79d602627e8538a8f7060f",
      "sha1": "b3b4b5a6c2064059925e68b508fa1f2003e90d3d",
      "md5": "8879b4bda64b5c6ca6f0187e76f538d1",
      "name": "libcpupower.so.5.4.0-1064",
      "size": 97800,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:22+00:00",
      "updated_at": "2023-02-11T11:52:22+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/usbip",
      "sha256": "edfc9b468852d18e824b830a380afdee78f418ebc415697c4759d38ff8f20f4a",
      "sha1": "ecbf2f2913e7f2e475f823e5b4bc777d36b01eb2",
      "md5": "b5020f5d5e4af88089893d9059f1c7ed",
      "name": "usbip",
      "size": 300512,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:22+00:00",
      "updated_at": "2023-02-11T11:52:22+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/libperf-jvmti.so",
      "sha256": "3fd87262461a04b0e109fd292ab3b37b6c195981d39cffce2d128fcf3d0eae6a",
      "sha1": "c20a74739c4844ac1ae2425f33142489ea454092",
      "md5": "ca5f007ba0ecb73efb25e7add09a4199",
      "name": "libperf-jvmti.so",
      "size": 243264,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:22+00:00",
      "updated_at": "2023-02-11T11:52:22+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/turbostat",
      "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b",
      "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda",
      "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:22+00:00",
      "updated_at": "2023-02-11T11:52:22+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/cpupower",
      "sha256": "4f3802cfe88affd2e07a69179ecd026111d2d8a703e7e708ef607b1df86f38ba",
      "sha1": "eb599e0b7125856581d05704bbc75bd3d2f9d32f",
      "md5": "703ef3f875ad9c7ed470d277ae1dd964",
      "name": "cpupower",
      "size": 337952,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:22+00:00",
      "updated_at": "2023-02-11T11:52:22+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/perf",
      "sha256": "2140567f850fcb9d72630cc0ff79341f0a4bfc1e0751d499715d7e7182f95ae4",
      "sha1": "4d45bc693d7843903b39a836a2a8ffdebbad4838",
      "md5": "60f101e7eb1fd2449e60abce5bdd0a8f",
      "name": "perf",
      "size": 21844784,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:23+00:00",
      "updated_at": "2023-02-11T11:52:23+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/acpidbg",
      "sha256": "e89f7a6bbed5f66bc9beb5f027b25415d1d90406de15dd27271406353be0c852",
      "sha1": "9e9abfaac2444cbf0db3a536dfeaf83a2d86ea15",
      "md5": "f4b5cdaa57386274b01b1b74e2231ef8",
      "name": "acpidbg",
      "size": 914040,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:23+00:00",
      "updated_at": "2023-02-11T11:52:23+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/bpftool",
      "sha256": "77336dd319948ca3cd8b10d912927fc642c9b6af74e1c8f2c07cd7507de65af4",
      "sha1": "b1be467f9f4930bb85f967d3385b5c51ca9e68bd",
      "md5": "f84fbaf6425e65e49b8d0333f87ba5f5",
      "name": "bpftool",
      "size": 552696,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:23+00:00",
      "updated_at": "2023-02-11T11:52:23+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/usbipd",
      "sha256": "aaf0f25877b97be7f98746967a528b6475cadc06bb55468ff6ba466a47febc99",
      "sha1": "cb890c4816189fa827f99d2fd5430f0ffda54249",
      "md5": "0aaf2a442eeda5a04ee85fb63c28d6dc",
      "name": "usbipd",
      "size": 297128,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:23+00:00",
      "updated_at": "2023-02-11T11:52:23+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 5134039,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T11:52:23+00:00",
      "updated_at": "2023-02-11T11:52:23+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:40:13+00:00",
      "updated_at": "2023-03-04T10:40:13+00:00"
    },
    {
      "name": "CVE-2022-3435",
      "risk": 43,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:41:11+00:00",
      "updated_at": "2023-03-04T10:41:11+00:00"
    },
    {
      "name": "CVE-2022-47929",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:41:47+00:00",
      "updated_at": "2023-03-04T10:41:47+00:00"
    },
    {
      "name": "CVE-2023-0461",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:45:40+00:00",
      "updated_at": "2023-03-04T10:45:40+00:00"
    },
    {
      "name": "CVE-2022-3521",
      "risk": 25,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:46:55+00:00",
      "updated_at": "2023-03-04T10:46:55+00:00"
    },
    {
      "name": "CVE-2022-42329",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:47:05+00:00",
      "updated_at": "2023-03-04T10:47:05+00:00"
    },
    {
      "name": "CVE-2022-4139",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:47:11+00:00",
      "updated_at": "2023-03-04T10:47:11+00:00"
    },
    {
      "name": "CVE-2022-47520",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:48:12+00:00",
      "updated_at": "2023-03-04T10:48:12+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:48:17+00:00",
      "updated_at": "2023-03-04T10:48:17+00:00"
    },
    {
      "name": "CVE-2022-3169",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:48:23+00:00",
      "updated_at": "2023-03-04T10:48:23+00:00"
    },
    {
      "name": "CVE-2022-3424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:48:47+00:00",
      "updated_at": "2023-03-04T10:48:47+00:00"
    },
    {
      "name": "CVE-2023-20938",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:49:07+00:00",
      "updated_at": "2023-03-04T10:49:07+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:59:08+00:00",
      "updated_at": "2023-03-04T10:59:08+00:00"
    },
    {
      "name": "CVE-2022-3623",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T10:59:39+00:00",
      "updated_at": "2023-03-04T10:59:39+00:00"
    },
    {
      "name": "CVE-2023-0394",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T11:10:55+00:00",
      "updated_at": "2023-03-04T11:10:55+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T11:10:59+00:00",
      "updated_at": "2023-03-04T11:10:59+00:00"
    },
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T11:11:11+00:00",
      "updated_at": "2023-03-04T11:11:11+00:00"
    },
    {
      "name": "CVE-2022-42328",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T11:12:55+00:00",
      "updated_at": "2023-03-04T11:12:55+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T11:13:27+00:00",
      "updated_at": "2023-03-04T11:13:27+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-03-04T11:13:31+00:00",
      "updated_at": "2023-03-04T11:13:31+00:00"
    },
    {
      "name": "CVE-2023-28328",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-04-21T09:24:43+00:00",
      "updated_at": "2023-04-21T09:24:43+00:00"
    },
    {
      "name": "CVE-2023-26607",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-04-21T09:25:14+00:00",
      "updated_at": "2023-04-21T09:25:14+00:00"
    },
    {
      "name": "CVE-2023-1382",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-04-21T09:29:29+00:00",
      "updated_at": "2023-04-21T09:29:29+00:00"
    },
    {
      "name": "CVE-2023-2166",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1065.69",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
      },
      "created_at": "2023-06-06T10:07:08+00:00",
      "updated_at": "2023-06-06T10:07:08+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2023-01-25T15:32:09+00:00",
  "updated_at": "2023-02-11T11:52:21+00:00",
  "deleted_at": null
}