Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (20)

linux-gkeop-tools-5.4.0-1054

Hashes
Linux kernel version specific tools for version 5.4.0-1054 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-1054 on 64 bit x86. You probably want to install linux-tools-5.4.0-1054-<flavour>.
  • SHA256: 57c8e03ee32bda106c6b5e33c530b72a3689e0e17dc0fb212b4d6fedda5ff7d8
  • SHA1: 42e1835dfda275ae93e1e92e2e325b18771e9f8a
  • MD5: 714d46e3261c7cdcfe67a6ecdf78565f
Information
  • Version: 5.4.0-1054.57
  • Filename: linux-gkeop-tools-5.4.0-1054_5.4.0-1054.57_amd64.deb
  • Size: 24472
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.4.0-1054
/usr/lib/libcpupower.so.5.4.0-1054
978000
usbip
/usr/lib/linux-gkeop-tools-5.4.0-1054/usbip
3005120
libperf-jvmti.so
/usr/lib/linux-gkeop-tools-5.4.0-1054/libperf-jvmti.so
2432640
turbostat
/usr/lib/linux-gkeop-tools-5.4.0-1054/turbostat
1344240
cpupower
/usr/lib/linux-gkeop-tools-5.4.0-1054/cpupower
3379520
perf
/usr/lib/linux-gkeop-tools-5.4.0-1054/perf
218408800
acpidbg
/usr/lib/linux-gkeop-tools-5.4.0-1054/acpidbg
9140400
bpftool
/usr/lib/linux-gkeop-tools-5.4.0-1054/bpftool
5526320
usbipd
/usr/lib/linux-gkeop-tools-5.4.0-1054/usbipd
2971280
x86_energy_perf_policy
/usr/lib/linux-gkeop-tools-5.4.0-1054/x86_energy_perf_policy
385440

Vulnerabilities

NameRiskSourceFixed
CVE-2022-4272078USN
linux-gkeop-source-5.4.0
5.4.0-1056.60
CVE-2022-4272155USN
linux-gkeop-source-5.4.0
5.4.0-1056.60
CVE-2022-4167481USN
linux-gkeop-source-5.4.0
5.4.0-1056.60
CVE-2022-26020USN
linux-gkeop-source-5.4.0
5.4.0-1056.60
CVE-2022-299010USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-215355USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4076855USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4122247USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-297878USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36258USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-2042270USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4270355USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36357USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-3918847USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4271988USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-302870USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36333USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36293USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2023-10956USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2023-25137USN
linux-gkeop-source-5.4.0
5.4.0-1057.61

Raw Object

{
  "sha256": "57c8e03ee32bda106c6b5e33c530b72a3689e0e17dc0fb212b4d6fedda5ff7d8",
  "sha1": "42e1835dfda275ae93e1e92e2e325b18771e9f8a",
  "md5": "714d46e3261c7cdcfe67a6ecdf78565f",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gkeop-tools-5.4.0-1054",
  "filename": "linux-gkeop-tools-5.4.0-1054_5.4.0-1054.57_amd64.deb",
  "size": 24472,
  "description": "Linux kernel version specific tools for version 5.4.0-1054\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1054 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1054-<flavour>.",
  "url": null,
  "version": "5.4.0-1054.57",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-1054",
      "sha256": "49999ce3ac66c5902675de83b6d532b00f3b2de99832a280c3d887d2beb5ef1a",
      "sha1": "d2b99be32729b5ffd0befe170946686043e133fd",
      "md5": "93b1a4c5a4994c362f6f75f692c62d67",
      "name": "libcpupower.so.5.4.0-1054",
      "size": 97800,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:01+00:00",
      "updated_at": "2022-10-06T18:11:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/usbip",
      "sha256": "8b5cf90d78ca8402e999f90bcad9e8c667d8b5cd3214b24e116094af594be77b",
      "sha1": "25d44725c911d1d167765546255900e2f0922343",
      "md5": "c5451963ef6c27d04f45b6e65ff18c2f",
      "name": "usbip",
      "size": 300512,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:01+00:00",
      "updated_at": "2022-10-06T18:11:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/libperf-jvmti.so",
      "sha256": "78372d4ea741ca8603b00bec3356d78944a8c1af4a8a3bb7f6f663aa04d4d3ef",
      "sha1": "b3a40ae555b9d3bcdf0617a7bf4cbb395557fac3",
      "md5": "a3ffdf0c915c93fe40878f9065b0e5a9",
      "name": "libperf-jvmti.so",
      "size": 243264,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:01+00:00",
      "updated_at": "2022-10-06T18:11:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/turbostat",
      "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b",
      "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda",
      "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:01+00:00",
      "updated_at": "2022-10-06T18:11:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/cpupower",
      "sha256": "2f98068b8bc71f137d8e33ea12e9fa27592b4692c7147a5cdffdf6ebf3b67d77",
      "sha1": "082b3d985092489f4f26f35a05be951e57ff001b",
      "md5": "010b48716c80339e98b4e9e099c38ccd",
      "name": "cpupower",
      "size": 337952,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:01+00:00",
      "updated_at": "2022-10-06T18:11:01+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/perf",
      "sha256": "da1d3aa594b5a12a04ae0b40e7fd1181ed5a0b4e1c34ec25e474aa67cbd68097",
      "sha1": "25f0dd49616fd96d4d1f63b98fde044d02172982",
      "md5": "ba8c69e6292492ab4521c365ca0ce9cd",
      "name": "perf",
      "size": 21840880,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:02+00:00",
      "updated_at": "2022-10-06T18:11:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/acpidbg",
      "sha256": "099506a8f39c13454e1e0c993b9db73ee4b1b32e2e6b6a545a802da66d59f683",
      "sha1": "aa5f56f60df3973a257b66ad63f234013a9cae31",
      "md5": "111fee09b837060527603fbc84ebd437",
      "name": "acpidbg",
      "size": 914040,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:02+00:00",
      "updated_at": "2022-10-06T18:11:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/bpftool",
      "sha256": "0ee8c9ac41429a4c046ff9b9b569f8cb8cf07c8a9e079abb7bfaa0526f1a042e",
      "sha1": "a759519e4ee0e8df5c65fe18f6302654590521fb",
      "md5": "459d61c2a2d3e5df44aa693795d838c0",
      "name": "bpftool",
      "size": 552632,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:02+00:00",
      "updated_at": "2022-10-06T18:11:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/usbipd",
      "sha256": "18df7b776da5a74c2dabbdc4d18d976ca7a679e86a321579688dbc2c1948b8dc",
      "sha1": "083b97b5eae0e6327e6648d072256db300daf1f6",
      "md5": "6138e206204788fba5578e744fa0a687",
      "name": "usbipd",
      "size": 297128,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:02+00:00",
      "updated_at": "2022-10-06T18:11:02+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 4810443,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-06T18:11:02+00:00",
      "updated_at": "2022-10-06T18:11:02+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-42720",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1056.60",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
      },
      "created_at": "2022-10-20T17:16:57+00:00",
      "updated_at": "2022-10-20T17:16:57+00:00"
    },
    {
      "name": "CVE-2022-42721",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1056.60",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
      },
      "created_at": "2022-10-20T18:10:45+00:00",
      "updated_at": "2022-10-20T18:10:45+00:00"
    },
    {
      "name": "CVE-2022-41674",
      "risk": 81,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1056.60",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
      },
      "created_at": "2022-10-20T18:33:23+00:00",
      "updated_at": "2022-10-20T18:33:23+00:00"
    },
    {
      "name": "CVE-2022-2602",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1056.60",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
      },
      "created_at": "2022-10-20T19:23:46+00:00",
      "updated_at": "2022-10-20T19:23:46+00:00"
    },
    {
      "name": "CVE-2022-29901",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:06:20+00:00",
      "updated_at": "2022-11-21T11:06:20+00:00"
    },
    {
      "name": "CVE-2022-2153",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:10:06+00:00",
      "updated_at": "2022-11-21T11:10:06+00:00"
    },
    {
      "name": "CVE-2022-40768",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:11:14+00:00",
      "updated_at": "2022-11-21T11:11:14+00:00"
    },
    {
      "name": "CVE-2022-41222",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:28:41+00:00",
      "updated_at": "2022-11-21T11:28:41+00:00"
    },
    {
      "name": "CVE-2022-2978",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:02+00:00",
      "updated_at": "2022-11-21T11:29:02+00:00"
    },
    {
      "name": "CVE-2022-3625",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:31+00:00",
      "updated_at": "2022-11-21T11:29:31+00:00"
    },
    {
      "name": "CVE-2022-20422",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:55+00:00",
      "updated_at": "2022-11-21T11:29:55+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:15+00:00",
      "updated_at": "2022-11-21T11:30:15+00:00"
    },
    {
      "name": "CVE-2022-3635",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:34+00:00",
      "updated_at": "2022-11-21T11:30:34+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:46+00:00",
      "updated_at": "2022-11-21T11:30:46+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:31:00+00:00",
      "updated_at": "2022-11-21T11:31:00+00:00"
    },
    {
      "name": "CVE-2022-3028",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-22T10:38:25+00:00",
      "updated_at": "2022-11-22T10:38:25+00:00"
    },
    {
      "name": "CVE-2022-3633",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:27:47+00:00",
      "updated_at": "2023-04-21T09:27:47+00:00"
    },
    {
      "name": "CVE-2022-3629",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:28:29+00:00",
      "updated_at": "2023-04-21T09:28:29+00:00"
    },
    {
      "name": "CVE-2023-1095",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:31:07+00:00",
      "updated_at": "2023-04-21T09:31:07+00:00"
    },
    {
      "name": "CVE-2023-2513",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-06-06T10:18:58+00:00",
      "updated_at": "2023-06-06T10:18:58+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-10-05T10:29:01+00:00",
  "updated_at": "2022-10-06T17:11:00+00:00",
  "deleted_at": null
}