Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (26)

linux-tools-5.4.0-126

Hashes
Linux kernel version specific tools for version 5.4.0-126 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-126 on 64 bit x86. You probably want to install linux-tools-5.4.0-126-<flavour>.
  • SHA256: d57dae566af8f98312472e48d2da9d7216fe19c85bf2e30d50632cf4ff2b76a7
  • SHA1: 928049de88ced4b37cc3c57155435a019720b2ba
  • MD5: 6c38813c7b65c2004afd69faab5d20b4
Information
  • Version: 5.4.0-126.142
  • Filename: linux-tools-5.4.0-126_5.4.0-126.142_amd64.deb
  • Size: 24767
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.4.0-126
/usr/lib/libcpupower.so.5.4.0-126
977920
usbip
/usr/lib/linux-tools-5.4.0-126/usbip
3004880
libperf-jvmti.so
/usr/lib/linux-tools-5.4.0-126/libperf-jvmti.so
2430320
turbostat
/usr/lib/linux-tools-5.4.0-126/turbostat
1344240
cpupower
/usr/lib/linux-tools-5.4.0-126/cpupower
3379440
perf
/usr/lib/linux-tools-5.4.0-126/perf
218021600
acpidbg
/usr/lib/linux-tools-5.4.0-126/acpidbg
9140160
bpftool
/usr/lib/linux-tools-5.4.0-126/bpftool
5515360
usbipd
/usr/lib/linux-tools-5.4.0-126/usbipd
2971040
x86_energy_perf_policy
/usr/lib/linux-tools-5.4.0-126/x86_energy_perf_policy
385440

Vulnerabilities

NameRiskSourceFixed
CVE-2022-337410USN
linux-tools-host
5.4.0-128.144
CVE-2022-337420USN
linux-tools-host
5.4.0-128.144
CVE-2022-3687955USN
linux-tools-host
5.4.0-128.144
CVE-2022-337440USN
linux-tools-host
5.4.0-128.144
CVE-2021-415944USN
linux-tools-host
5.4.0-128.144
CVE-2022-263650USN
linux-tools-host
5.4.0-128.144
CVE-2022-2637355USN
linux-tools-host
5.4.0-128.144
CVE-2022-2036967USN
linux-tools-host
5.4.0-128.144
CVE-2022-337400USN
linux-tools-host
5.4.0-128.144
CVE-2022-23180USN
linux-tools-host
5.4.0-128.144
CVE-2022-317678USN
linux-tools-host
5.4.0-128.144
CVE-2021-415944USN
linux-libc-dev
5.4.0-128.144
CVE-2022-337400USN
linux-libc-dev
5.4.0-128.144
CVE-2022-317678USN
linux-libc-dev
5.4.0-128.144
CVE-2022-337440USN
linux-libc-dev
5.4.0-128.144
CVE-2022-3687955USN
linux-libc-dev
5.4.0-128.144
CVE-2022-2036967USN
linux-libc-dev
5.4.0-128.144
CVE-2022-337410USN
linux-libc-dev
5.4.0-128.144
CVE-2022-263650USN
linux-libc-dev
5.4.0-128.144
CVE-2022-337420USN
linux-libc-dev
5.4.0-128.144
CVE-2022-2637355USN
linux-libc-dev
5.4.0-128.144
CVE-2022-23180USN
linux-libc-dev
5.4.0-128.144
CVE-2022-205668USN
linux-libc-dev
5.4.0-128.144
CVE-2022-146263USN
linux-libc-dev
5.4.0-128.144
CVE-2022-215050USN
linux-libc-dev
5.4.0-128.144
CVE-2023-21776USN
linux-libc-dev
5.4.0-128.144

Raw Object

{
  "sha256": "d57dae566af8f98312472e48d2da9d7216fe19c85bf2e30d50632cf4ff2b76a7",
  "sha1": "928049de88ced4b37cc3c57155435a019720b2ba",
  "md5": "6c38813c7b65c2004afd69faab5d20b4",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-tools-5.4.0-126",
  "filename": "linux-tools-5.4.0-126_5.4.0-126.142_amd64.deb",
  "size": 24767,
  "description": "Linux kernel version specific tools for version 5.4.0-126\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-126 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-126-<flavour>.",
  "url": null,
  "version": "5.4.0-126.142",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-126",
      "sha256": "1b1e2c8c522bb75cdbf305b144b13bc39bbe2fd53985e9416c36c6cae031881c",
      "sha1": "0c86ad778110d71ef47a94cfb72a15c619aed167",
      "md5": "6a06ab4a40b47313e9a6850ebdc4d8c0",
      "name": "libcpupower.so.5.4.0-126",
      "size": 97792,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/usbip",
      "sha256": "70f79ed8c6b637d4391640a04024e71254e7b39af722b7819cd341c9c2a210c7",
      "sha1": "1632be5ebe1968f444655cd2127a40428fd2d765",
      "md5": "8303fc5313063c49f03c212ba3bcc2a7",
      "name": "usbip",
      "size": 300488,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/libperf-jvmti.so",
      "sha256": "6f36586106bc5f44708c2903f4e4bc5c7e4e25bf21fbbbc29db07ef40ef0fc48",
      "sha1": "6d407486709a2cf7ad21cc8d7ab447ca690a1648",
      "md5": "afa16fddbea78e1696a6addd6b5afdd2",
      "name": "libperf-jvmti.so",
      "size": 243032,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/turbostat",
      "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b",
      "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda",
      "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/cpupower",
      "sha256": "5da22a3939c23f0fc1b28ef5eef72822dbde5c755bbf57d5dd308ebc74359af1",
      "sha1": "aa4342c66b39f9863f2b8d4f145209a33206e152",
      "md5": "15fe8d7ae139597c096fa41944f1c440",
      "name": "cpupower",
      "size": 337944,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/perf",
      "sha256": "dfcb880ebdf3ede4826a4bae8e6f4c9266d008def57bb542a4cf8b0b50ca6de4",
      "sha1": "6e4693631fd928ad17086c37a1fdfb1bb5ca40d5",
      "md5": "6f46336202523a2a7ae5ad93e0630efc",
      "name": "perf",
      "size": 21802160,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/acpidbg",
      "sha256": "2b06e730ca93ed1f89df485eb36faf16f03894e4dbb2b7cda10bff0cbdcd42fb",
      "sha1": "0b8a864436fd3e06580235893615fc0a6170bf13",
      "md5": "928e7aaccd31ee4345ba2877e12444e6",
      "name": "acpidbg",
      "size": 914016,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/bpftool",
      "sha256": "ac655a45e7ac84d9137b568ded038f36ee3f1d7e47784822b97a25079196cd7b",
      "sha1": "c8036e4545db028fb7dbbcda48c16b37c67bb95c",
      "md5": "752ee992e2cf4b98d16ca47a97ccc4a7",
      "name": "bpftool",
      "size": 551536,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/usbipd",
      "sha256": "da46139128ed0459519e41bd2ed7d193d2e529ffe8abd46762518ce0c39cfb03",
      "sha1": "5f2b63e48279afafb385a77b484e96d47ada8a41",
      "md5": "538705d517e4aa0c243b5168d7e87feb",
      "name": "usbipd",
      "size": 297104,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.4.0-126/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 3949853,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-31T03:17:34+00:00",
      "updated_at": "2022-08-31T03:17:34+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:26:50+00:00",
      "updated_at": "2022-10-11T17:26:50+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:31:12+00:00",
      "updated_at": "2022-10-11T17:31:12+00:00"
    },
    {
      "name": "CVE-2022-36879",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:31:22+00:00",
      "updated_at": "2022-10-11T17:31:22+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:36:53+00:00",
      "updated_at": "2022-10-11T17:36:53+00:00"
    },
    {
      "name": "CVE-2021-4159",
      "risk": 44,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:37:01+00:00",
      "updated_at": "2022-10-11T17:37:01+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:37:08+00:00",
      "updated_at": "2022-10-11T17:37:08+00:00"
    },
    {
      "name": "CVE-2022-26373",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:37:17+00:00",
      "updated_at": "2022-10-11T17:37:17+00:00"
    },
    {
      "name": "CVE-2022-20369",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:37:39+00:00",
      "updated_at": "2022-10-11T17:37:39+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:37:56+00:00",
      "updated_at": "2022-10-11T17:37:56+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:38:09+00:00",
      "updated_at": "2022-10-11T17:38:09+00:00"
    },
    {
      "name": "CVE-2022-3176",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d2f7e210bb1ea7fa314891c9fe4e02b05f1cf2826b17682a0f069f446f5fe393",
        "name": "linux-tools-host",
        "version": "5.4.0-128.144",
        "filename": "linux-tools-host_5.4.0-128.144_all.deb"
      },
      "created_at": "2022-10-11T17:38:18+00:00",
      "updated_at": "2022-10-11T17:38:18+00:00"
    },
    {
      "name": "CVE-2021-4159",
      "risk": 44,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T16:55:45+00:00",
      "updated_at": "2022-10-12T16:55:45+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:01:19+00:00",
      "updated_at": "2022-10-12T17:01:19+00:00"
    },
    {
      "name": "CVE-2022-3176",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:04:59+00:00",
      "updated_at": "2022-10-12T17:04:59+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:06:16+00:00",
      "updated_at": "2022-10-12T17:06:16+00:00"
    },
    {
      "name": "CVE-2022-36879",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:06:26+00:00",
      "updated_at": "2022-10-12T17:06:26+00:00"
    },
    {
      "name": "CVE-2022-20369",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:06:37+00:00",
      "updated_at": "2022-10-12T17:06:37+00:00"
    },
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:12:48+00:00",
      "updated_at": "2022-10-12T17:12:48+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:20:15+00:00",
      "updated_at": "2022-10-12T17:20:15+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:20:29+00:00",
      "updated_at": "2022-10-12T17:20:29+00:00"
    },
    {
      "name": "CVE-2022-26373",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:24:57+00:00",
      "updated_at": "2022-10-12T17:24:57+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2022-10-12T17:28:36+00:00",
      "updated_at": "2022-10-12T17:28:36+00:00"
    },
    {
      "name": "CVE-2022-20566",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2023-01-29T16:54:44+00:00",
      "updated_at": "2023-01-29T16:54:44+00:00"
    },
    {
      "name": "CVE-2022-1462",
      "risk": 63,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2023-03-07T12:11:19+00:00",
      "updated_at": "2023-03-07T12:11:19+00:00"
    },
    {
      "name": "CVE-2022-21505",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2023-04-21T09:38:12+00:00",
      "updated_at": "2023-04-21T09:38:12+00:00"
    },
    {
      "name": "CVE-2023-2177",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "268a3b80e5f309a0b863358fa871b2599d5189e845a634ceb80d79b5cd65c26f",
        "name": "linux-libc-dev",
        "version": "5.4.0-128.144",
        "filename": "linux-libc-dev_5.4.0-128.144_amd64.deb"
      },
      "created_at": "2023-06-06T09:35:11+00:00",
      "updated_at": "2023-06-06T09:35:11+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-08-30T11:18:37+00:00",
  "updated_at": "2022-08-31T02:17:33+00:00",
  "deleted_at": null
}