Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (29)

linux-gkeop-tools-5.4.0-1048

Hashes
Linux kernel version specific tools for version 5.4.0-1048 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-1048 on 64 bit x86. You probably want to install linux-tools-5.4.0-1048-<flavour>.
  • SHA256: 4a266867874ef8552bf2c27287cc76c7599c0dc53359f1c99fe70d0a5b961e66
  • SHA1: 2c96398034afa21bf7c15603fa1253464dfa1210
  • MD5: 0ac04405876b81e4657c6bff06080129
Information
  • Version: 5.4.0-1048.51
  • Filename: linux-gkeop-tools-5.4.0-1048_5.4.0-1048.51_amd64.deb
  • Size: 24436
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.4.0-1048
/usr/lib/libcpupower.so.5.4.0-1048
978000
usbip
/usr/lib/linux-gkeop-tools-5.4.0-1048/usbip
3005120
libperf-jvmti.so
/usr/lib/linux-gkeop-tools-5.4.0-1048/libperf-jvmti.so
2432640
turbostat
/usr/lib/linux-gkeop-tools-5.4.0-1048/turbostat
1344240
cpupower
/usr/lib/linux-gkeop-tools-5.4.0-1048/cpupower
3379520
perf
/usr/lib/linux-gkeop-tools-5.4.0-1048/perf
218376160
acpidbg
/usr/lib/linux-gkeop-tools-5.4.0-1048/acpidbg
9140400
bpftool
/usr/lib/linux-gkeop-tools-5.4.0-1048/bpftool
5526320
usbipd
/usr/lib/linux-gkeop-tools-5.4.0-1048/usbipd
2971280
x86_energy_perf_policy
/usr/lib/linux-gkeop-tools-5.4.0-1048/x86_energy_perf_policy
385440

Vulnerabilities

NameRiskSourceFixed
CVE-2022-11950USN
CVE-2022-11990USN
CVE-2022-120455USN
CVE-2022-120547USN
CVE-2022-339810USN
CVE-2022-17890USN
CVE-2022-120455USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-11990USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-11950USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-339810USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-120547USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-17890USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-25880USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-2889378USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-25860USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-197441USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-16790USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-17340USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-165278USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-04940USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-10480USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-349180USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-197555USN
linux-gkeop-source-5.4.0
5.4.0-1051.54
CVE-2022-2838878USN
CVE-2022-2838878USN
linux-gkeop-source-5.4.0
5.4.0-1049.52
CVE-2022-263978USN
CVE-2022-418587USN
CVE-2022-299167USN
CVE-2023-31590USN
linux-gkeop-source-5.4.0
5.4.0-1051.54

Raw Object

{
  "sha256": "4a266867874ef8552bf2c27287cc76c7599c0dc53359f1c99fe70d0a5b961e66",
  "sha1": "2c96398034afa21bf7c15603fa1253464dfa1210",
  "md5": "0ac04405876b81e4657c6bff06080129",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gkeop-tools-5.4.0-1048",
  "filename": "linux-gkeop-tools-5.4.0-1048_5.4.0-1048.51_amd64.deb",
  "size": 24436,
  "description": "Linux kernel version specific tools for version 5.4.0-1048\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1048 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1048-<flavour>.",
  "url": null,
  "version": "5.4.0-1048.51",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-1048",
      "sha256": "57fbcddcd153f6ad6ae665369a6a3fe3128519399822eaf07b38266a0d81a27a",
      "sha1": "5fcaaee2b9ec6df1b5fbc8005dd1a5e15e3c454d",
      "md5": "921ef0fc29cdf77726df7f6bc40a7fc9",
      "name": "libcpupower.so.5.4.0-1048",
      "size": 97800,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/usbip",
      "sha256": "ffe9a3d925fbd1038831ec0f1fb7abb77bd15d9a7748d3c9ca78a325b91f7cdc",
      "sha1": "9dad416f36916a9ad017afb77bae6f0db4a9b6df",
      "md5": "f11bd16356d8511852cf0cb7a172851e",
      "name": "usbip",
      "size": 300512,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/libperf-jvmti.so",
      "sha256": "9e938802cff167843a29178a1d754474bce2eff3cbb328ffa79b46b07284fe46",
      "sha1": "0eb4cdb9d3bfd49a6fce8dd938ebd60dfd00c457",
      "md5": "56cb9f42107a1399d7104c2df07065a5",
      "name": "libperf-jvmti.so",
      "size": 243264,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/turbostat",
      "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785",
      "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846",
      "md5": "3dca491f8622de5e10e9125e01b85e3e",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/cpupower",
      "sha256": "266f52e91af30ac74e211575dfaca730077d810fb2e87c01acc20a1852a059e5",
      "sha1": "b6eaee11741bb0ce7f19f937f368d3f321d3d527",
      "md5": "ea93b05a3354995f71bd110aea2f29b0",
      "name": "cpupower",
      "size": 337952,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/perf",
      "sha256": "f7731d67b3675c63d7365da600f29bf220473ffa2395ea37ede38edd6744738c",
      "sha1": "36676d37e2803dc6b8987950a93de8251ad33cc0",
      "md5": "0ab5314752965db4bfbc9bcd3a3c84ff",
      "name": "perf",
      "size": 21837616,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/acpidbg",
      "sha256": "89ca7ba64b815356a8f743b3c08b30d050f74a87173351aa2c277dd99a7c20f2",
      "sha1": "8fa58cd39772ccc7620b08086352c9dca0635bbf",
      "md5": "6b5362706f80f60822a2ea64f3f2dc66",
      "name": "acpidbg",
      "size": 914040,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/bpftool",
      "sha256": "d9b95698e709329b83a7b4247d5b3d4cddc56955a348d0a60624db8e659a975a",
      "sha1": "6275bd1328f819a90582bb413ad0cac0ac53380e",
      "md5": "9feb0f441d7504551ef3d54776da0633",
      "name": "bpftool",
      "size": 552632,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/usbipd",
      "sha256": "b68168a738c876a113f512ee9a0f3a26a58f54f2f3d899639bfa932e00415b73",
      "sha1": "13b3f5e08119107f30d495882f7fe915f2eb8b75",
      "md5": "11d787acef56c00d365958d54ca984fd",
      "name": "usbipd",
      "size": 297128,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 3784307,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-16T03:24:02+00:00",
      "updated_at": "2022-06-16T03:24:02+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-14T02:51:26+00:00",
      "updated_at": "2022-07-14T02:51:26+00:00"
    },
    {
      "name": "CVE-2022-1199",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-14T02:52:57+00:00",
      "updated_at": "2022-07-14T02:52:57+00:00"
    },
    {
      "name": "CVE-2022-1204",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-14T02:53:35+00:00",
      "updated_at": "2022-07-14T02:53:35+00:00"
    },
    {
      "name": "CVE-2022-1205",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-14T02:54:56+00:00",
      "updated_at": "2022-07-14T02:54:56+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-14T02:58:35+00:00",
      "updated_at": "2022-07-14T02:58:35+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-14T02:59:09+00:00",
      "updated_at": "2022-07-14T02:59:09+00:00"
    },
    {
      "name": "CVE-2022-1204",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-22T02:54:40+00:00",
      "updated_at": "2022-07-22T02:54:40+00:00"
    },
    {
      "name": "CVE-2022-1199",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-22T03:12:25+00:00",
      "updated_at": "2022-07-22T03:12:25+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-22T04:40:22+00:00",
      "updated_at": "2022-07-22T04:40:22+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-22T05:18:11+00:00",
      "updated_at": "2022-07-22T05:18:11+00:00"
    },
    {
      "name": "CVE-2022-1205",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-22T06:09:04+00:00",
      "updated_at": "2022-07-22T06:09:04+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-07-22T07:50:04+00:00",
      "updated_at": "2022-07-22T07:50:04+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:03:22+00:00",
      "updated_at": "2022-08-11T03:03:22+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:13:55+00:00",
      "updated_at": "2022-08-11T03:13:55+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:16:08+00:00",
      "updated_at": "2022-08-11T03:16:08+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:17:10+00:00",
      "updated_at": "2022-08-11T03:17:10+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:24:28+00:00",
      "updated_at": "2022-08-11T03:24:28+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:27:05+00:00",
      "updated_at": "2022-08-11T03:27:05+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:29:41+00:00",
      "updated_at": "2022-08-11T03:29:41+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:31:38+00:00",
      "updated_at": "2022-08-11T03:31:38+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:39:31+00:00",
      "updated_at": "2022-08-11T03:39:31+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:41:40+00:00",
      "updated_at": "2022-08-11T03:41:40+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2022-08-11T03:46:08+00:00",
      "updated_at": "2022-08-11T03:46:08+00:00"
    },
    {
      "name": "CVE-2022-28388",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:21:41+00:00",
      "updated_at": "2022-08-14T02:21:41+00:00"
    },
    {
      "name": "CVE-2022-28388",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1049.52",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb"
      },
      "created_at": "2022-11-11T12:06:58+00:00",
      "updated_at": "2022-11-11T12:06:58+00:00"
    },
    {
      "name": "CVE-2022-2639",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:24:59+00:00",
      "updated_at": "2023-02-18T11:24:59+00:00"
    },
    {
      "name": "CVE-2022-41858",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:42:53+00:00",
      "updated_at": "2023-02-18T11:42:53+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:38:55+00:00",
      "updated_at": "2023-04-21T09:38:55+00:00"
    },
    {
      "name": "CVE-2023-3159",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1051.54",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb"
      },
      "created_at": "2023-07-12T10:06:19+00:00",
      "updated_at": "2023-07-12T10:06:19+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-06-10T20:50:12+00:00",
  "updated_at": "2022-06-16T02:24:01+00:00",
  "deleted_at": null
}