Raw Object
{
"sha256": "6e729ad21f6ce8eae31d78946aa50f688dcb2c82a89ac2f4de295563e86076db",
"sha1": "0786cda16e43be54a12d135a6b65e683f13ec683",
"md5": "589b8635f729532404c7fe6e7fd8865c",
"type": "DEB",
"arch": "AMD64",
"name": "linux-tools-5.4.0-1064-gkeop",
"filename": "linux-tools-5.4.0-1064-gkeop_5.4.0-1064.68_amd64.deb",
"size": 330,
"description": "Linux kernel version specific tools for version 5.4.0-1064\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1064 on\n64 bit x86.",
"url": null,
"version": "5.4.0-1064.68",
"source": "linux-gkeop",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "linux-gkeop-tools-5.4.0-1064",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2023-0045",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:40:13+00:00",
"updated_at": "2023-03-04T10:40:13+00:00"
},
{
"name": "CVE-2022-3435",
"risk": 43,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:41:11+00:00",
"updated_at": "2023-03-04T10:41:11+00:00"
},
{
"name": "CVE-2022-47929",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:41:47+00:00",
"updated_at": "2023-03-04T10:41:47+00:00"
},
{
"name": "CVE-2023-0461",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:45:40+00:00",
"updated_at": "2023-03-04T10:45:40+00:00"
},
{
"name": "CVE-2022-3521",
"risk": 25,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:46:55+00:00",
"updated_at": "2023-03-04T10:46:55+00:00"
},
{
"name": "CVE-2022-42329",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:47:05+00:00",
"updated_at": "2023-03-04T10:47:05+00:00"
},
{
"name": "CVE-2022-4139",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:47:11+00:00",
"updated_at": "2023-03-04T10:47:11+00:00"
},
{
"name": "CVE-2022-47520",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:12+00:00",
"updated_at": "2023-03-04T10:48:12+00:00"
},
{
"name": "CVE-2022-36280",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:17+00:00",
"updated_at": "2023-03-04T10:48:17+00:00"
},
{
"name": "CVE-2022-3169",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:23+00:00",
"updated_at": "2023-03-04T10:48:23+00:00"
},
{
"name": "CVE-2022-3424",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:47+00:00",
"updated_at": "2023-03-04T10:48:47+00:00"
},
{
"name": "CVE-2023-20938",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:49:07+00:00",
"updated_at": "2023-03-04T10:49:07+00:00"
},
{
"name": "CVE-2023-0266",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:59:08+00:00",
"updated_at": "2023-03-04T10:59:08+00:00"
},
{
"name": "CVE-2022-3623",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:59:39+00:00",
"updated_at": "2023-03-04T10:59:39+00:00"
},
{
"name": "CVE-2023-0394",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:10:55+00:00",
"updated_at": "2023-03-04T11:10:55+00:00"
},
{
"name": "CVE-2023-23455",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:10:59+00:00",
"updated_at": "2023-03-04T11:10:59+00:00"
},
{
"name": "CVE-2022-3545",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:11:11+00:00",
"updated_at": "2023-03-04T11:11:11+00:00"
},
{
"name": "CVE-2022-42328",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:12:55+00:00",
"updated_at": "2023-03-04T11:12:55+00:00"
},
{
"name": "CVE-2022-41218",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:13:27+00:00",
"updated_at": "2023-03-04T11:13:27+00:00"
},
{
"name": "CVE-2023-23454",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:13:31+00:00",
"updated_at": "2023-03-04T11:13:31+00:00"
},
{
"name": "CVE-2023-28328",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-04-21T09:24:43+00:00",
"updated_at": "2023-04-21T09:24:43+00:00"
},
{
"name": "CVE-2023-26607",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-04-21T09:25:14+00:00",
"updated_at": "2023-04-21T09:25:14+00:00"
},
{
"name": "CVE-2023-1382",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-04-21T09:29:29+00:00",
"updated_at": "2023-04-21T09:29:29+00:00"
},
{
"name": "CVE-2023-2166",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-06-06T10:07:08+00:00",
"updated_at": "2023-06-06T10:07:08+00:00"
}
],
"risk": 78,
"vulnerable": 78,
"outdated": 78,
"malicious": 0,
"created_at": "2023-01-25T15:32:09+00:00",
"updated_at": "2023-02-11T11:53:27+00:00",
"deleted_at": null
}