Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (25)

linux-oem-6.1-tools-6.1.0-1008

Hashes
Linux kernel version specific tools for version 6.1.0-1008 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 6.1.0-1008 on 64 bit x86. You probably want to install linux-tools-6.1.0-1008-<flavour>.
  • SHA256: 585ef2a1c57880c6e76a762bba361c7e380ad78b444205fa980616e2178b1392
  • SHA1: 3437307dc2887bde4860b9a812728a77d9abee66
  • MD5: 6c08c533fa521d86b4c4310ea0d8696c
Information
  • Version: 6.1.0-1008.8
  • Filename: linux-oem-6.1-tools-6.1.0-1008_6.1.0-1008.8_amd64.deb
  • Size: 27689
  • Type: DEB
  • Source: linux-oem-6.1
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.6.1.0-1008
/usr/lib/libcpupower.so.6.1.0-1008
849040
usbip
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbip
2489520
libperf-jvmti.so
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/libperf-jvmti.so
2200400
turbostat
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/turbostat
1484720
cpupower
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/cpupower
2991840
perf
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/perf
240129600
acpidbg
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/acpidbg
9342800
bpftool
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/bpftool
17616160
usbipd
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbipd
2493520
x86_energy_perf_policy
/usr/lib/linux-oem-6.1-tools-6.1.0-1008/x86_energy_perf_policy
466160

Vulnerabilities

NameRiskSourceFixed
CVE-2023-15836USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-18298USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-284667USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-10778USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-10760USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-288660USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-16700USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-19980USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2022-42696USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-18556USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-304568USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-10797USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-19905USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-1032USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-19890USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-250125USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-11188USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-307720USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-21947USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-22358USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-332030USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-332885USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-32206USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-33550USN
linux-oem-6.1-tools-host
6.1.0-1009.9
CVE-2023-29850USN
linux-oem-6.1-tools-host
6.1.0-1009.9

Raw Object

{
  "sha256": "585ef2a1c57880c6e76a762bba361c7e380ad78b444205fa980616e2178b1392",
  "sha1": "3437307dc2887bde4860b9a812728a77d9abee66",
  "md5": "6c08c533fa521d86b4c4310ea0d8696c",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-6.1-tools-6.1.0-1008",
  "filename": "linux-oem-6.1-tools-6.1.0-1008_6.1.0-1008.8_amd64.deb",
  "size": 27689,
  "description": "Linux kernel version specific tools for version 6.1.0-1008\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 6.1.0-1008 on\n64 bit x86.\nYou probably want to install linux-tools-6.1.0-1008-<flavour>.",
  "url": null,
  "version": "6.1.0-1008.8",
  "source": "linux-oem-6.1",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.6.1.0-1008",
      "sha256": "0199022a7dadbcaab2170a54f8c7b6fdc26663d9f45480d6f6d2773537bdec27",
      "sha1": "426b9b88c6b340f1df71323e712cceed6297daa6",
      "md5": "f265e1113bea0bc6102f9908c6211dd9",
      "name": "libcpupower.so.6.1.0-1008",
      "size": 84904,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbip",
      "sha256": "699c7d8e4ac788ce87c3e977805086194d4c4b709878690314f294651a04ef70",
      "sha1": "dd76d0f891a291fc8732e65d272ec8d3e6db296b",
      "md5": "f78aa74167474559d6d3bffaf9d7a501",
      "name": "usbip",
      "size": 248952,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/libperf-jvmti.so",
      "sha256": "b176bf46295f38e72c573756932d72edd4593e17e7e1607a9c7d7d3316b053a2",
      "sha1": "e2573748dfdc40ccee2bc3d5ab8c37df207013d6",
      "md5": "07af5b265767d0cb60390da1d4f856a2",
      "name": "libperf-jvmti.so",
      "size": 220040,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/turbostat",
      "sha256": "690f49d45bbd407119cfecd6a63179bf8e31f46a5b97775e579c60d5448bf9fb",
      "sha1": "1842101af3ef4cdcbfaf97032c025a83e0c62741",
      "md5": "a7505cd70313122501a9a53aeae512d5",
      "name": "turbostat",
      "size": 148472,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/cpupower",
      "sha256": "78c9b31207fb4c1c7fc55809b2628b031148dd2fe72b7d131be12de2140e653d",
      "sha1": "73ec134daeff0f206d8d4c5b8772de14c2ada4cb",
      "md5": "210fec0f47c4401d8ba6e1835546953f",
      "name": "cpupower",
      "size": 299184,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/perf",
      "sha256": "b428ba3a89a52e3721e884ce10ab9051dcdbca42b0c6ae5200a724a799d9be99",
      "sha1": "fb55751d7b98f8df8d3683a6247482a9f2881e2f",
      "md5": "5d72db5d085c809dad8593d63f863eac",
      "name": "perf",
      "size": 24012960,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/acpidbg",
      "sha256": "f40e6be092f12e5b8cc3b68b506e4052bf35f0ee76d6975d2bd31997eb3afd1c",
      "sha1": "9a9176c14c23b2dff96f18fe4700098c0969684a",
      "md5": "078681054d1b2c7b2751b44911b70e85",
      "name": "acpidbg",
      "size": 934280,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/bpftool",
      "sha256": "187f945ea9e2f7d19007dd93d8f4496141713473547a9f1b998dce69aafb6177",
      "sha1": "0879e8d1c845c21de6fd39acfbdaf1b5465f7c3e",
      "md5": "1177f7b83c3b691204e09e403c893e53",
      "name": "bpftool",
      "size": 1761616,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbipd",
      "sha256": "3749b6c73efc0d4ab1f801d6934708ccae7945c1e4b35db9d63791ff2849e0dd",
      "sha1": "49abea10f7ae1bd55c92b3b70927ad02d5a23318",
      "md5": "edd27dde4c0fd75d7f907c1dfeda3b78",
      "name": "usbipd",
      "size": 249352,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/x86_energy_perf_policy",
      "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643",
      "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5",
      "md5": "e9d52e1dde799b718aef361de0e9b299",
      "name": "x86_energy_perf_policy",
      "size": 46616,
      "description": null,
      "package": 5175802,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-05T10:10:35+00:00",
      "updated_at": "2023-03-05T10:10:35+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2023-1583",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:09:25+00:00",
      "updated_at": "2023-04-20T09:09:25+00:00"
    },
    {
      "name": "CVE-2023-1829",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:09:25+00:00",
      "updated_at": "2023-04-20T09:09:25+00:00"
    },
    {
      "name": "CVE-2023-28466",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:10:13+00:00",
      "updated_at": "2023-04-20T09:10:13+00:00"
    },
    {
      "name": "CVE-2023-1077",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:10:13+00:00",
      "updated_at": "2023-04-20T09:10:13+00:00"
    },
    {
      "name": "CVE-2023-1076",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:18:58+00:00",
      "updated_at": "2023-04-20T09:18:58+00:00"
    },
    {
      "name": "CVE-2023-28866",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:19:14+00:00",
      "updated_at": "2023-04-20T09:19:14+00:00"
    },
    {
      "name": "CVE-2023-1670",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:19:25+00:00",
      "updated_at": "2023-04-20T09:19:25+00:00"
    },
    {
      "name": "CVE-2023-1998",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:20:00+00:00",
      "updated_at": "2023-04-20T09:20:00+00:00"
    },
    {
      "name": "CVE-2022-4269",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:20:00+00:00",
      "updated_at": "2023-04-20T09:20:00+00:00"
    },
    {
      "name": "CVE-2023-1855",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:20:23+00:00",
      "updated_at": "2023-04-20T09:20:23+00:00"
    },
    {
      "name": "CVE-2023-30456",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:20:58+00:00",
      "updated_at": "2023-04-20T09:20:58+00:00"
    },
    {
      "name": "CVE-2023-1079",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:21:28+00:00",
      "updated_at": "2023-04-20T09:21:28+00:00"
    },
    {
      "name": "CVE-2023-1990",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:21:41+00:00",
      "updated_at": "2023-04-20T09:21:41+00:00"
    },
    {
      "name": "CVE-2023-1032",
      "risk": null,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:21:54+00:00",
      "updated_at": "2023-04-20T09:21:54+00:00"
    },
    {
      "name": "CVE-2023-1989",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:22:35+00:00",
      "updated_at": "2023-04-20T09:22:35+00:00"
    },
    {
      "name": "CVE-2023-25012",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:22:49+00:00",
      "updated_at": "2023-04-20T09:22:49+00:00"
    },
    {
      "name": "CVE-2023-1118",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-04-20T09:23:05+00:00",
      "updated_at": "2023-04-20T09:23:05+00:00"
    },
    {
      "name": "CVE-2023-30772",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-05-13T11:14:15+00:00",
      "updated_at": "2023-05-13T11:14:15+00:00"
    },
    {
      "name": "CVE-2023-2194",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-05-13T13:51:06+00:00",
      "updated_at": "2023-05-13T13:51:06+00:00"
    },
    {
      "name": "CVE-2023-2235",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-06-06T09:37:34+00:00",
      "updated_at": "2023-06-06T09:37:34+00:00"
    },
    {
      "name": "CVE-2023-33203",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-06-06T09:43:19+00:00",
      "updated_at": "2023-06-06T09:43:19+00:00"
    },
    {
      "name": "CVE-2023-33288",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-06-06T10:10:32+00:00",
      "updated_at": "2023-06-06T10:10:32+00:00"
    },
    {
      "name": "CVE-2023-3220",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-08-09T09:28:57+00:00",
      "updated_at": "2023-08-09T09:28:57+00:00"
    },
    {
      "name": "CVE-2023-3355",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-09-13T10:02:40+00:00",
      "updated_at": "2023-09-13T10:02:40+00:00"
    },
    {
      "name": "CVE-2023-2985",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1009.9",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb"
      },
      "created_at": "2023-09-13T10:48:33+00:00",
      "updated_at": "2023-09-13T10:48:33+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2023-03-03T11:30:09+00:00",
  "updated_at": "2023-03-05T10:10:35+00:00",
  "deleted_at": null
}