Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (20)

linux-oem-5.17-tools-5.17.0-1009

Hashes
Linux kernel version specific tools for version 5.17.0-1009 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.17.0-1009 on 64 bit x86. You probably want to install linux-tools-5.17.0-1009-<flavour>.
  • SHA256: e3d7d0d38f0b51d663ec7089225501732d88e8a7dd59efdbccd1f07932f1e45a
  • SHA1: dcc0088218ca56fa0cf61b7ab464a0101d8da244
  • MD5: 03a34fa28487a355c6b6f35182d0faac
Information
  • Version: 5.17.0-1009.9
  • Filename: linux-oem-5.17-tools-5.17.0-1009_5.17.0-1009.9_amd64.deb
  • Size: 26293
  • Type: DEB
  • Source: linux-oem-5.17
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.17.0-1009
/usr/lib/libcpupower.so.5.17.0-1009
817920
usbip
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbip
2489520
libperf-jvmti.so
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/libperf-jvmti.so
2159440
turbostat
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/turbostat
1435360
cpupower
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/cpupower
2944240
perf
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/perf
227048800
acpidbg
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/acpidbg
9342800
bpftool
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/bpftool
17095680
usbipd
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbipd
2493520
x86_energy_perf_policy
/usr/lib/linux-oem-5.17-tools-5.17.0-1009/x86_energy_perf_policy
466080

Vulnerabilities

NameRiskSourceFixed
CVE-2022-120547USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-322500USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-2149967USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-322960USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-101291USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-197555USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-19430USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-17340USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-20780USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-19720USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-197441USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-339810USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-2996878USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-263978USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-352675USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2022-418587USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2023-209388USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2023-34390USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2023-31590USN
linux-oem-5.17-tools-host
5.17.0-1011.12
CVE-2023-43897USN
linux-oem-5.17-tools-host
5.17.0-1011.12

Raw Object

{
  "sha256": "e3d7d0d38f0b51d663ec7089225501732d88e8a7dd59efdbccd1f07932f1e45a",
  "sha1": "dcc0088218ca56fa0cf61b7ab464a0101d8da244",
  "md5": "03a34fa28487a355c6b6f35182d0faac",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-5.17-tools-5.17.0-1009",
  "filename": "linux-oem-5.17-tools-5.17.0-1009_5.17.0-1009.9_amd64.deb",
  "size": 26293,
  "description": "Linux kernel version specific tools for version 5.17.0-1009\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.17.0-1009 on\n64 bit x86.\nYou probably want to install linux-tools-5.17.0-1009-<flavour>.",
  "url": null,
  "version": "5.17.0-1009.9",
  "source": "linux-oem-5.17",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.17.0-1009",
      "sha256": "f6301e0329c091f3d2418417a51b3c023d4d850736af7d5957a250c8ccde583c",
      "sha1": "41940f4e90cdfdaf6ddbf9ec2f4eefbc65ede6b0",
      "md5": "3d7ddc76fc10a3c64db978cb2e975943",
      "name": "libcpupower.so.5.17.0-1009",
      "size": 81792,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbip",
      "sha256": "a426ce002b49408b4cdfda2c0c915f99e578244c5807827c83e279e148f14be7",
      "sha1": "08004884e41cf5adf72ba0b237789db1fba5b9a4",
      "md5": "8a556595d17dffed1aa04bd0e9d0dd03",
      "name": "usbip",
      "size": 248952,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/libperf-jvmti.so",
      "sha256": "bb3c2435f07aafd3ec4f4824b5c031a67e3d7c5ab97b481fbdc02cba6ead55f4",
      "sha1": "85831979bb0f5bba57c463d2f01859f9d4bc3ee2",
      "md5": "223e4cf0c3cdb2e700251edb6318df5d",
      "name": "libperf-jvmti.so",
      "size": 215944,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/turbostat",
      "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206",
      "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b",
      "md5": "74e235bf371ac5db13aeeacee0cc7acd",
      "name": "turbostat",
      "size": 143536,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/cpupower",
      "sha256": "9d2ee70809f6521bcbed0f176f63e97165dc0989f0374db57dc18f0c096c0b60",
      "sha1": "e444af02468a105e363b3eb92d1ecee211686811",
      "md5": "09b350ff5c0bb0d88029cb4db8c3f7bb",
      "name": "cpupower",
      "size": 294424,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/perf",
      "sha256": "fe02a8c1e025995e853097b5e676eb2942e153ce38779f2d36dade60a8394a94",
      "sha1": "55a0012ba0176347da8a8f1f71e0279635fe65b6",
      "md5": "e85cd60e102bef7c393aeb156ff23237",
      "name": "perf",
      "size": 22704880,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/acpidbg",
      "sha256": "f5f37161d022ecd4c808b9d3ac0f73215ec959990c407551468d88294a74b82a",
      "sha1": "1967ead0da57dc52cb9f00c29cbdbbc92b3bbf62",
      "md5": "128852ba89f9f7688b85b5ce8c522e9f",
      "name": "acpidbg",
      "size": 934280,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/bpftool",
      "sha256": "d40a3b4e2b2fafbbc204efb221e99cb68f59208db2c78bdc8d429d595d82485f",
      "sha1": "e234bb6c564762b08bfbaddc59865da357f94138",
      "md5": "aba836a7651956212faae6aa9d66cbc2",
      "name": "bpftool",
      "size": 1709568,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbipd",
      "sha256": "d88c1db001d73904ff033549139559d97e85b4225f3596645d9992997a803f76",
      "sha1": "6b7f49a2a7e8af64b7fae6b7e090cb51091e4130",
      "md5": "4bf7193d9a4ab6c39ac198b9c6b96e98",
      "name": "usbipd",
      "size": 249352,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/x86_energy_perf_policy",
      "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543",
      "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b",
      "md5": "b22454323232ae918c7ea0cc55df6557",
      "name": "x86_energy_perf_policy",
      "size": 46608,
      "description": null,
      "package": 3755552,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-02T02:43:38+00:00",
      "updated_at": "2022-06-02T02:43:38+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-1205",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T16:39:23+00:00",
      "updated_at": "2022-09-16T16:39:23+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T16:53:45+00:00",
      "updated_at": "2022-09-16T16:53:45+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T16:54:34+00:00",
      "updated_at": "2022-09-16T16:54:34+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T16:54:36+00:00",
      "updated_at": "2022-09-16T16:54:36+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T16:55:19+00:00",
      "updated_at": "2022-09-16T16:55:19+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T16:57:07+00:00",
      "updated_at": "2022-09-16T16:57:07+00:00"
    },
    {
      "name": "CVE-2022-1943",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T17:11:19+00:00",
      "updated_at": "2022-09-16T17:11:19+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T17:11:49+00:00",
      "updated_at": "2022-09-16T17:11:49+00:00"
    },
    {
      "name": "CVE-2022-2078",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T17:13:43+00:00",
      "updated_at": "2022-09-16T17:13:43+00:00"
    },
    {
      "name": "CVE-2022-1972",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T17:15:30+00:00",
      "updated_at": "2022-09-16T17:15:30+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T17:16:24+00:00",
      "updated_at": "2022-09-16T17:16:24+00:00"
    },
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-16T17:21:11+00:00",
      "updated_at": "2022-09-16T17:21:11+00:00"
    },
    {
      "name": "CVE-2022-29968",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2022-09-18T22:53:43+00:00",
      "updated_at": "2022-09-18T22:53:43+00:00"
    },
    {
      "name": "CVE-2022-2639",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2023-02-18T11:25:02+00:00",
      "updated_at": "2023-02-18T11:25:02+00:00"
    },
    {
      "name": "CVE-2022-3526",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2023-02-18T11:40:18+00:00",
      "updated_at": "2023-02-18T11:40:18+00:00"
    },
    {
      "name": "CVE-2022-41858",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2023-02-18T11:42:55+00:00",
      "updated_at": "2023-02-18T11:42:55+00:00"
    },
    {
      "name": "CVE-2023-20938",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2023-03-07T12:09:55+00:00",
      "updated_at": "2023-03-07T12:09:55+00:00"
    },
    {
      "name": "CVE-2023-3439",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2023-07-12T09:57:58+00:00",
      "updated_at": "2023-07-12T09:57:58+00:00"
    },
    {
      "name": "CVE-2023-3159",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2023-07-12T10:06:21+00:00",
      "updated_at": "2023-07-12T10:06:21+00:00"
    },
    {
      "name": "CVE-2023-4389",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3",
        "name": "linux-oem-5.17-tools-host",
        "version": "5.17.0-1011.12",
        "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb"
      },
      "created_at": "2023-09-13T10:28:03+00:00",
      "updated_at": "2023-09-13T10:28:03+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-01T23:03:54+00:00",
  "updated_at": "2022-06-02T01:43:37+00:00",
  "deleted_at": null
}