Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (55)

linux-oem-6.1-tools-6.1.0-1007

Hashes
Linux kernel version specific tools for version 6.1.0-1007 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 6.1.0-1007 on 64 bit x86. You probably want to install linux-tools-6.1.0-1007-<flavour>.
  • SHA256: d65493bdf9930c07ae65a69012ba939fdab745edb86875cfb7920d1dfdf98c2f
  • SHA1: 9603cea09944fb37bb5fc9b8162cf21f74b683c8
  • MD5: 3073db747e655d461d31df8e30fea314
Information
  • Version: 6.1.0-1007.7
  • Filename: linux-oem-6.1-tools-6.1.0-1007_6.1.0-1007.7_amd64.deb
  • Size: 27661
  • Type: DEB
  • Source: linux-oem-6.1
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.6.1.0-1007
/usr/lib/libcpupower.so.6.1.0-1007
849040
usbip
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/usbip
2489520
libperf-jvmti.so
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/libperf-jvmti.so
2200400
turbostat
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/turbostat
1484720
cpupower
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/cpupower
2991840
perf
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/perf
240124800
acpidbg
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/acpidbg
9342800
bpftool
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/bpftool
17616160
usbipd
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/usbipd
2493520
x86_energy_perf_policy
/usr/lib/linux-oem-6.1-tools-6.1.0-1007/x86_energy_perf_policy
466160

Vulnerabilities

NameRiskSourceFixed
CVE-2022-48420USN
CVE-2023-10746USN
CVE-2022-276720USN
CVE-2022-43826USN
CVE-2023-10788USN
CVE-2023-12818USN
CVE-2023-03946USN
CVE-2023-10750USN
CVE-2023-235590USN
CVE-2023-10737USN
CVE-2022-21969USN
CVE-2023-265458USN
CVE-2022-276720USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2022-48420USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-10737USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-10746USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-265458USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-10750USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-12818USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2022-43826USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-235590USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2022-21969USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-10788USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-03946USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2022-4013355USN
CVE-2023-16520USN
CVE-2022-3845755USN
CVE-2023-03868USN
CVE-2023-15130USN
CVE-2023-15130USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-16520USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2022-4013355USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-03868USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2022-3845755USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-21620USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-04580USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-322697USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-211020USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-211060USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-04590USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-322697USN
CVE-2023-04580USN
CVE-2023-21620USN
CVE-2023-211060USN
CVE-2023-211020USN
CVE-2023-04590USN
CVE-2023-33590USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-339510USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-31610USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-339520USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-33580USN
linux-oem-6.1-tools-host
6.1.0-1008.8
CVE-2023-33580USN
CVE-2023-339510USN
CVE-2023-339520USN
CVE-2023-35670USN
linux-oem-6.1-tools-host
6.1.0-1008.8

Raw Object

{
  "sha256": "d65493bdf9930c07ae65a69012ba939fdab745edb86875cfb7920d1dfdf98c2f",
  "sha1": "9603cea09944fb37bb5fc9b8162cf21f74b683c8",
  "md5": "3073db747e655d461d31df8e30fea314",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-6.1-tools-6.1.0-1007",
  "filename": "linux-oem-6.1-tools-6.1.0-1007_6.1.0-1007.7_amd64.deb",
  "size": 27661,
  "description": "Linux kernel version specific tools for version 6.1.0-1007\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 6.1.0-1007 on\n64 bit x86.\nYou probably want to install linux-tools-6.1.0-1007-<flavour>.",
  "url": null,
  "version": "6.1.0-1007.7",
  "source": "linux-oem-6.1",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.6.1.0-1007",
      "sha256": "d2895beca4309389ea45a91c4a649e3fe7a9cd4cc0ec9d6a15e85e3acf82ad9a",
      "sha1": "b16f7de31358134c5ad0dd67455322b7f72c363d",
      "md5": "1b1ae45b41104ed0633d59458551c003",
      "name": "libcpupower.so.6.1.0-1007",
      "size": 84904,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:09+00:00",
      "updated_at": "2023-02-11T10:59:09+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/usbip",
      "sha256": "d78ea59b52af63e635669b43410c4238223b78fdb8b25b31b5de08803fab91eb",
      "sha1": "1577d8c12668bb4922b76e8417ae33951ff2b392",
      "md5": "4e4066ab853ed13878b82ba8e2cbe2a7",
      "name": "usbip",
      "size": 248952,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:09+00:00",
      "updated_at": "2023-02-11T10:59:09+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/libperf-jvmti.so",
      "sha256": "cc6a2e7b15e62b2aa48bc610ec149c0a4b07d5777933e5cd86e31106054fdee1",
      "sha1": "40cc911789ad9d2e7c0fe24224e030ce9f07e9b6",
      "md5": "7977a72ea705bd14208d95d189b0a63e",
      "name": "libperf-jvmti.so",
      "size": 220040,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:09+00:00",
      "updated_at": "2023-02-11T10:59:09+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/turbostat",
      "sha256": "690f49d45bbd407119cfecd6a63179bf8e31f46a5b97775e579c60d5448bf9fb",
      "sha1": "1842101af3ef4cdcbfaf97032c025a83e0c62741",
      "md5": "a7505cd70313122501a9a53aeae512d5",
      "name": "turbostat",
      "size": 148472,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:09+00:00",
      "updated_at": "2023-02-11T10:59:09+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/cpupower",
      "sha256": "baf69ee80cb45084e5c99d9a02f6d39765ef478f7534540ae8afdf4c5df844b7",
      "sha1": "f88fa4758dd8f18fab32216347c07251572a4551",
      "md5": "9f9fce456c66672d4db345c3a74aa95c",
      "name": "cpupower",
      "size": 299184,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:09+00:00",
      "updated_at": "2023-02-11T10:59:09+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/perf",
      "sha256": "91210c496df5f24fb907af88f719b5b25b72b84cb5d2f95dcc100d09dff423b9",
      "sha1": "52e960c924cd2e2a1a40a557e70cecc3da3fb84e",
      "md5": "06b02bad59c289552629714a106618ea",
      "name": "perf",
      "size": 24012480,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:10+00:00",
      "updated_at": "2023-02-11T10:59:10+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/acpidbg",
      "sha256": "7225052f0d62313e43f2741118b277813d0175a10567b31b68901d547b66f711",
      "sha1": "70d8de29de4508d3d556ca07e8fdfda12988df3e",
      "md5": "5cd1579e3a9ada5f47b722493d045d02",
      "name": "acpidbg",
      "size": 934280,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:10+00:00",
      "updated_at": "2023-02-11T10:59:10+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/bpftool",
      "sha256": "5c2c977a53f3c170770e28b27416c39546d31acc3f4005a0ec4e62e4fc59c22d",
      "sha1": "05306d22921f682a41b48016d6b4a67d53ed406a",
      "md5": "a9a45d1ca933fd52ec54aab1bf8e1ace",
      "name": "bpftool",
      "size": 1761616,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:10+00:00",
      "updated_at": "2023-02-11T10:59:10+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/usbipd",
      "sha256": "1afc515183b03492d2ce7d0dc9b29c959b6d73ae5e6e5da0bacb8bd57217af58",
      "sha1": "b441f8aad5ae8e1f7d2f5d2e6f660bbbc8400fa1",
      "md5": "dc96dc340621e43debc2bc2b3f1625b0",
      "name": "usbipd",
      "size": 249352,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:10+00:00",
      "updated_at": "2023-02-11T10:59:10+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1007/x86_energy_perf_policy",
      "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643",
      "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5",
      "md5": "e9d52e1dde799b718aef361de0e9b299",
      "name": "x86_energy_perf_policy",
      "size": 46616,
      "description": null,
      "package": 5132091,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T10:59:10+00:00",
      "updated_at": "2023-02-11T10:59:10+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-4842",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:34:10+00:00",
      "updated_at": "2023-03-28T09:34:10+00:00"
    },
    {
      "name": "CVE-2023-1074",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:26:53+00:00",
      "updated_at": "2023-03-28T09:26:53+00:00"
    },
    {
      "name": "CVE-2022-27672",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:34:38+00:00",
      "updated_at": "2023-03-28T09:34:38+00:00"
    },
    {
      "name": "CVE-2022-4382",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:34:39+00:00",
      "updated_at": "2023-03-28T09:34:39+00:00"
    },
    {
      "name": "CVE-2023-1078",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:35:08+00:00",
      "updated_at": "2023-03-28T09:35:08+00:00"
    },
    {
      "name": "CVE-2023-1281",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:35:58+00:00",
      "updated_at": "2023-03-28T09:35:58+00:00"
    },
    {
      "name": "CVE-2023-0394",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:42:54+00:00",
      "updated_at": "2023-03-28T09:42:54+00:00"
    },
    {
      "name": "CVE-2023-1075",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:46:13+00:00",
      "updated_at": "2023-03-28T09:46:13+00:00"
    },
    {
      "name": "CVE-2023-23559",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:46:14+00:00",
      "updated_at": "2023-03-28T09:46:14+00:00"
    },
    {
      "name": "CVE-2023-1073",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:46:22+00:00",
      "updated_at": "2023-03-28T09:46:22+00:00"
    },
    {
      "name": "CVE-2022-2196",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:46:55+00:00",
      "updated_at": "2023-03-28T09:46:55+00:00"
    },
    {
      "name": "CVE-2023-26545",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-28T09:52:26+00:00",
      "updated_at": "2023-03-28T09:52:26+00:00"
    },
    {
      "name": "CVE-2022-27672",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T09:48:59+00:00",
      "updated_at": "2023-03-29T09:48:59+00:00"
    },
    {
      "name": "CVE-2022-4842",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T09:48:59+00:00",
      "updated_at": "2023-03-29T09:48:59+00:00"
    },
    {
      "name": "CVE-2023-1073",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T09:50:21+00:00",
      "updated_at": "2023-03-29T09:50:21+00:00"
    },
    {
      "name": "CVE-2023-1074",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T09:50:21+00:00",
      "updated_at": "2023-03-29T09:50:21+00:00"
    },
    {
      "name": "CVE-2023-26545",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T09:58:20+00:00",
      "updated_at": "2023-03-29T09:58:20+00:00"
    },
    {
      "name": "CVE-2023-1075",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T10:00:12+00:00",
      "updated_at": "2023-03-29T10:00:12+00:00"
    },
    {
      "name": "CVE-2023-1281",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T10:00:42+00:00",
      "updated_at": "2023-03-29T10:00:42+00:00"
    },
    {
      "name": "CVE-2022-4382",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T10:09:16+00:00",
      "updated_at": "2023-03-29T10:09:16+00:00"
    },
    {
      "name": "CVE-2023-23559",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T10:12:57+00:00",
      "updated_at": "2023-03-29T10:12:57+00:00"
    },
    {
      "name": "CVE-2022-2196",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T10:13:50+00:00",
      "updated_at": "2023-03-29T10:13:50+00:00"
    },
    {
      "name": "CVE-2023-1078",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T10:19:42+00:00",
      "updated_at": "2023-03-29T10:19:42+00:00"
    },
    {
      "name": "CVE-2023-0394",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-03-29T10:19:48+00:00",
      "updated_at": "2023-03-29T10:19:48+00:00"
    },
    {
      "name": "CVE-2022-40133",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:23:41+00:00",
      "updated_at": "2023-04-21T09:23:41+00:00"
    },
    {
      "name": "CVE-2023-1652",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:26:39+00:00",
      "updated_at": "2023-04-21T09:26:39+00:00"
    },
    {
      "name": "CVE-2022-38457",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:27:00+00:00",
      "updated_at": "2023-04-21T09:27:00+00:00"
    },
    {
      "name": "CVE-2023-0386",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:31:29+00:00",
      "updated_at": "2023-04-21T09:31:29+00:00"
    },
    {
      "name": "CVE-2023-1513",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:37:36+00:00",
      "updated_at": "2023-04-21T09:37:36+00:00"
    },
    {
      "name": "CVE-2023-1513",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-04-22T09:34:02+00:00",
      "updated_at": "2023-04-22T09:34:02+00:00"
    },
    {
      "name": "CVE-2023-1652",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-04-22T09:34:05+00:00",
      "updated_at": "2023-04-22T09:34:05+00:00"
    },
    {
      "name": "CVE-2022-40133",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-04-22T09:37:11+00:00",
      "updated_at": "2023-04-22T09:37:11+00:00"
    },
    {
      "name": "CVE-2023-0386",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-04-22T09:37:14+00:00",
      "updated_at": "2023-04-22T09:37:14+00:00"
    },
    {
      "name": "CVE-2022-38457",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-04-22T09:38:23+00:00",
      "updated_at": "2023-04-22T09:38:23+00:00"
    },
    {
      "name": "CVE-2023-2162",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-05-13T10:36:54+00:00",
      "updated_at": "2023-05-13T10:36:54+00:00"
    },
    {
      "name": "CVE-2023-0458",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-05-13T11:29:09+00:00",
      "updated_at": "2023-05-13T11:29:09+00:00"
    },
    {
      "name": "CVE-2023-32269",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-05-13T11:59:13+00:00",
      "updated_at": "2023-05-13T11:59:13+00:00"
    },
    {
      "name": "CVE-2023-21102",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-05-13T12:31:57+00:00",
      "updated_at": "2023-05-13T12:31:57+00:00"
    },
    {
      "name": "CVE-2023-21106",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-05-13T13:17:05+00:00",
      "updated_at": "2023-05-13T13:17:05+00:00"
    },
    {
      "name": "CVE-2023-0459",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-05-13T13:32:50+00:00",
      "updated_at": "2023-05-13T13:32:50+00:00"
    },
    {
      "name": "CVE-2023-32269",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-18T09:40:05+00:00",
      "updated_at": "2023-05-18T09:40:05+00:00"
    },
    {
      "name": "CVE-2023-0458",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-18T09:43:03+00:00",
      "updated_at": "2023-05-18T09:43:03+00:00"
    },
    {
      "name": "CVE-2023-2162",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-18T09:44:33+00:00",
      "updated_at": "2023-05-18T09:44:33+00:00"
    },
    {
      "name": "CVE-2023-21106",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-18T09:50:39+00:00",
      "updated_at": "2023-05-18T09:50:39+00:00"
    },
    {
      "name": "CVE-2023-21102",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-18T09:51:31+00:00",
      "updated_at": "2023-05-18T09:51:31+00:00"
    },
    {
      "name": "CVE-2023-0459",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-18T09:52:11+00:00",
      "updated_at": "2023-05-18T09:52:11+00:00"
    },
    {
      "name": "CVE-2023-3359",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-07-12T10:00:57+00:00",
      "updated_at": "2023-07-12T10:00:57+00:00"
    },
    {
      "name": "CVE-2023-33951",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-07-12T10:02:56+00:00",
      "updated_at": "2023-07-12T10:02:56+00:00"
    },
    {
      "name": "CVE-2023-3161",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-07-12T10:04:12+00:00",
      "updated_at": "2023-07-12T10:04:12+00:00"
    },
    {
      "name": "CVE-2023-33952",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-07-12T10:04:13+00:00",
      "updated_at": "2023-07-12T10:04:13+00:00"
    },
    {
      "name": "CVE-2023-3358",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-07-12T10:05:13+00:00",
      "updated_at": "2023-07-12T10:05:13+00:00"
    },
    {
      "name": "CVE-2023-3358",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-08-02T12:19:00+00:00",
      "updated_at": "2023-08-02T12:19:00+00:00"
    },
    {
      "name": "CVE-2023-33951",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-08-04T09:36:28+00:00",
      "updated_at": "2023-08-04T09:36:28+00:00"
    },
    {
      "name": "CVE-2023-33952",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-08-04T09:37:17+00:00",
      "updated_at": "2023-08-04T09:37:17+00:00"
    },
    {
      "name": "CVE-2023-3567",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "6a77b047ac86e240b62b6dd250d33b3aab8233925bda2d3c94b5fde65592d91d",
        "name": "linux-oem-6.1-tools-host",
        "version": "6.1.0-1008.8",
        "filename": "linux-oem-6.1-tools-host_6.1.0-1008.8_all.deb"
      },
      "created_at": "2023-08-09T09:24:03+00:00",
      "updated_at": "2023-08-09T09:24:03+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2023-02-08T16:21:38+00:00",
  "updated_at": "2023-02-11T10:59:09+00:00",
  "deleted_at": null
}