Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (29)

linux-tools-5.4.0-136

Hashes
Linux kernel version specific tools for version 5.4.0-136 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-136 on 64 bit x86. You probably want to install linux-tools-5.4.0-136-<flavour>.
  • SHA256: 497306970230bf0f97d4fcf3f34d5216dee1812e8771542945d9ddab14c41661
  • SHA1: d36d8da14719afa5c42322fbc6c49e54f1fc69e5
  • MD5: f616502883612960279de4a376e07585
Information
  • Version: 5.4.0-136.153
  • Filename: linux-tools-5.4.0-136_5.4.0-136.153_amd64.deb
  • Size: 24796
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
bpftool
/usr/lib/linux-tools-5.4.0-136/bpftool
5516000
usbipd
/usr/lib/linux-tools-5.4.0-136/usbipd
2971040
libcpupower.so.5.4.0-136
/usr/lib/libcpupower.so.5.4.0-136
977920
usbip
/usr/lib/linux-tools-5.4.0-136/usbip
3004880
libperf-jvmti.so
/usr/lib/linux-tools-5.4.0-136/libperf-jvmti.so
2430320
turbostat
/usr/lib/linux-tools-5.4.0-136/turbostat
1344240
cpupower
/usr/lib/linux-tools-5.4.0-136/cpupower
3379440
perf
/usr/lib/linux-tools-5.4.0-136/perf
218055520
acpidbg
/usr/lib/linux-tools-5.4.0-136/acpidbg
9140160
x86_energy_perf_policy
/usr/lib/linux-tools-5.4.0-136/x86_energy_perf_policy
385440

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-source-5.4.0
5.4.0-135.152
CVE-2022-356671USN
linux-source-5.4.0
5.4.0-135.152
CVE-2022-356480USN
linux-source-5.4.0
5.4.0-135.152
CVE-2022-356771USN
linux-source-5.4.0
5.4.0-135.152
CVE-2022-36218USN
linux-source-5.4.0
5.4.0-135.152
CVE-2022-352475USN
linux-source-5.4.0
5.4.0-135.152
CVE-2022-356580USN
linux-source-5.4.0
5.4.0-135.152
CVE-2022-352475USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356580USN
linux-libc-dev
5.4.0-135.152
CVE-2022-36218USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356771USN
linux-libc-dev
5.4.0-135.152
CVE-2022-359475USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356671USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356480USN
linux-libc-dev
5.4.0-135.152
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-libc-dev
5.4.0-137.154
CVE-2022-459348USN
linux-libc-dev
5.4.0-137.154
CVE-2022-428969USN
linux-libc-dev
5.4.0-137.154
CVE-2022-364310USN
linux-libc-dev
5.4.0-137.154
CVE-2022-359475USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356671USN
linux-libc-dev
5.4.0-135.152
CVE-2022-36218USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356480USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356771USN
linux-libc-dev
5.4.0-135.152
CVE-2022-352475USN
linux-libc-dev
5.4.0-135.152
CVE-2022-356580USN
linux-libc-dev
5.4.0-135.152

Raw Object

{
  "sha256": "497306970230bf0f97d4fcf3f34d5216dee1812e8771542945d9ddab14c41661",
  "sha1": "d36d8da14719afa5c42322fbc6c49e54f1fc69e5",
  "md5": "f616502883612960279de4a376e07585",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-tools-5.4.0-136",
  "filename": "linux-tools-5.4.0-136_5.4.0-136.153_amd64.deb",
  "size": 24796,
  "description": "Linux kernel version specific tools for version 5.4.0-136\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-136 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-136-<flavour>.",
  "url": null,
  "version": "5.4.0-136.153",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/bpftool",
      "sha256": "fcf7411cd3a0cc4b87ad8e94b4924a7f5a777fb863eb21e07e3b9019890e7352",
      "sha1": "ece7f0b04e3229f55d14ebd7697078ef7969e825",
      "md5": "dcf87979982e586300b66745d98e4ff4",
      "name": "bpftool",
      "size": 551600,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:24+00:00",
      "updated_at": "2022-12-01T10:50:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/usbipd",
      "sha256": "05b538af9568a605a79a5418198b6d7bce3ba2d6cb01d6c04edbd22d5dfca83f",
      "sha1": "e2869d7e958f77bdc4f43c87fb2cde0c52cf63ad",
      "md5": "f64ffabd97aeb3040ca28ad21d22efa7",
      "name": "usbipd",
      "size": 297104,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:24+00:00",
      "updated_at": "2022-12-01T10:50:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-136",
      "sha256": "8c919ebda5e0c6ba72113dfef15e6516170467d6977cc98572501a01d6805efb",
      "sha1": "fec6d8712b48b024ce350f925dd186d879f808a0",
      "md5": "247e37c0b59a40371eebc7f1e0906bf9",
      "name": "libcpupower.so.5.4.0-136",
      "size": 97792,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:15+00:00",
      "updated_at": "2022-12-01T10:50:15+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/usbip",
      "sha256": "9ab5c1ccb074357140cc74b19d5ccd748421fccdfc81599eae9e858eeca34698",
      "sha1": "7d4d4c500ecec1bc772eefe182cde30967ffed85",
      "md5": "d0ea99ba586286e90252cadc934627de",
      "name": "usbip",
      "size": 300488,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:18+00:00",
      "updated_at": "2022-12-01T10:50:18+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/libperf-jvmti.so",
      "sha256": "69bc831b8ba54138f123d59586a8a304826a73702b1012d22cc41ab57d1ff4f0",
      "sha1": "39227be2bd24ad37d6e31afe15ab906e2e1c6699",
      "md5": "d6476cfe3050d0c47b41a397c96783f3",
      "name": "libperf-jvmti.so",
      "size": 243032,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:22+00:00",
      "updated_at": "2022-12-01T10:50:22+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/turbostat",
      "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b",
      "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda",
      "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:22+00:00",
      "updated_at": "2022-12-01T10:50:22+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/cpupower",
      "sha256": "2b154ae1af79c678eeeae7bdc8b3e414e8e2c6cac125edf48922090a1c2aa119",
      "sha1": "5710a91a06c22d826c2f870b2ca33e9610d61910",
      "md5": "7132574f3978d2e8de9a6cefc7862ada",
      "name": "cpupower",
      "size": 337944,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:23+00:00",
      "updated_at": "2022-12-01T10:50:23+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/perf",
      "sha256": "58009797c07010c332da3dedde14f781ab69a1146d8e148ca0b2affbb5c5a5f5",
      "sha1": "90e21f16ee100cf7ce6cf6e04140ba38d38267c2",
      "md5": "599ac53d37b4d133b0657208979fa618",
      "name": "perf",
      "size": 21805552,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:24+00:00",
      "updated_at": "2022-12-01T10:50:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/acpidbg",
      "sha256": "ff2eb6e3bccc06e032e6f4c8a943b75ac0d79e096206e77b68c7b78f5a298024",
      "sha1": "19c9c6bc989aeeabddeeeda18ef3c25b440cffb0",
      "md5": "2d985edd1bbcbf6410ad23ea6c314a37",
      "name": "acpidbg",
      "size": 914016,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:24+00:00",
      "updated_at": "2022-12-01T10:50:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-136/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 4938258,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-01T10:50:24+00:00",
      "updated_at": "2022-12-01T10:50:24+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-135.152",
        "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:25:42+00:00",
      "updated_at": "2022-12-02T12:25:42+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-135.152",
        "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:41:41+00:00",
      "updated_at": "2022-12-02T12:41:41+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-135.152",
        "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:42:26+00:00",
      "updated_at": "2022-12-02T12:42:26+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-135.152",
        "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:43:15+00:00",
      "updated_at": "2022-12-02T12:43:15+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-135.152",
        "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:44:19+00:00",
      "updated_at": "2022-12-02T12:44:19+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-135.152",
        "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:45:44+00:00",
      "updated_at": "2022-12-02T12:45:44+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-135.152",
        "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:46:24+00:00",
      "updated_at": "2022-12-02T12:46:24+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-03T12:39:01+00:00",
      "updated_at": "2022-12-03T12:39:01+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-03T12:41:42+00:00",
      "updated_at": "2022-12-03T12:41:42+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-03T12:42:47+00:00",
      "updated_at": "2022-12-03T12:42:47+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-03T12:43:22+00:00",
      "updated_at": "2022-12-03T12:43:22+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-03T12:44:20+00:00",
      "updated_at": "2022-12-03T12:44:20+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-03T12:45:02+00:00",
      "updated_at": "2022-12-03T12:45:02+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_i386.deb"
      },
      "created_at": "2022-12-03T12:45:41+00:00",
      "updated_at": "2022-12-03T12:45:41+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:44:37+00:00",
      "updated_at": "2023-01-13T10:44:37+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:46+00:00",
      "updated_at": "2023-01-13T10:52:46+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:11+00:00",
      "updated_at": "2023-01-13T10:53:11+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:15+00:00",
      "updated_at": "2023-01-13T10:55:15+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb"
      },
      "created_at": "2023-01-14T10:24:56+00:00",
      "updated_at": "2023-01-14T10:24:56+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb"
      },
      "created_at": "2023-01-14T10:26:03+00:00",
      "updated_at": "2023-01-14T10:26:03+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb"
      },
      "created_at": "2023-01-14T10:26:19+00:00",
      "updated_at": "2023-01-14T10:26:19+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c",
        "name": "linux-libc-dev",
        "version": "5.4.0-137.154",
        "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb"
      },
      "created_at": "2023-01-14T10:26:40+00:00",
      "updated_at": "2023-01-14T10:26:40+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb"
      },
      "created_at": "2023-01-21T10:58:48+00:00",
      "updated_at": "2023-01-21T10:58:48+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb"
      },
      "created_at": "2023-01-26T20:04:17+00:00",
      "updated_at": "2023-01-26T20:04:17+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb"
      },
      "created_at": "2023-01-27T03:22:47+00:00",
      "updated_at": "2023-01-27T03:22:47+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb"
      },
      "created_at": "2023-01-27T03:41:20+00:00",
      "updated_at": "2023-01-27T03:41:20+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb"
      },
      "created_at": "2023-01-27T05:31:24+00:00",
      "updated_at": "2023-01-27T05:31:24+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb"
      },
      "created_at": "2023-01-27T17:45:44+00:00",
      "updated_at": "2023-01-27T17:45:44+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8",
        "name": "linux-libc-dev",
        "version": "5.4.0-135.152",
        "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb"
      },
      "created_at": "2023-01-27T18:45:43+00:00",
      "updated_at": "2023-01-27T18:45:43+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-24T18:14:11+00:00",
  "updated_at": "2022-12-01T10:50:08+00:00",
  "deleted_at": null
}