Zercurity data services
  • Summary
  • Applications (8)
  • Packages (0)
  • Vulnerabilities (17)

linux-aws-tools-4.15.0-1087

Hashes
Linux kernel version specific tools for version 4.15.0-1087 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.15.0-1087 on 64 bit x86. You probably want to install linux-tools-4.15.0-1087-<flavour>.
  • SHA256: 0b53aa354cd832494ba94f3ac6f991437dad93ae3cf793528386c3ba76cd78d3
  • SHA1: 84e94e081e8e5549ee4f807644fc30f23fee92de
  • MD5: 7081ed95d07f59295178aead82f7fa5c
Information
  • Version: 4.15.0-1087.92
  • Filename: linux-aws-tools-4.15.0-1087_4.15.0-1087.92_amd64.deb
  • Size: 20226
  • Type: DEB
  • Source: linux-aws
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.4.15.0-1087
/usr/lib/libcpupower.so.4.15.0-1087
794400
perf
/usr/lib/linux-aws-tools-4.15.0-1087/perf
189457200
x86_energy_perf_policy
/usr/lib/linux-aws-tools-4.15.0-1087/x86_energy_perf_policy
384080
cpupower
/usr/lib/linux-aws-tools-4.15.0-1087/cpupower
2950000
libperf-jvmti.so
/usr/lib/linux-aws-tools-4.15.0-1087/libperf-jvmti.so
2090000
usbip
/usr/lib/linux-aws-tools-4.15.0-1087/usbip
2806160
turbostat
/usr/lib/linux-aws-tools-4.15.0-1087/turbostat
1189840
usbipd
/usr/lib/linux-aws-tools-4.15.0-1087/usbipd
2142080

Vulnerabilities

NameRiskSourceFixed
CVE-2021-060549USN
CVE-2020-2809759USN
CVE-2020-2528441USN
USN-4752-1
CVE-2020-2528564USN
USN-4660-1
CVE-2020-2521160USN
USN-4660-1
CVE-2020-1439056USN
USN-4660-1
CVE-2020-2564575USN
USN-4660-1
CVE-2020-1435178USN
USN-4660-1
CVE-2020-2564155USN
USN-4752-1
CVE-2020-046572USN
CVE-2020-2891561USN
USN-4752-1
CVE-2020-2564375USN
USN-4752-1
CVE-2020-3631255USN
CVE-2021-04480USN
CVE-2021-104878USN
CVE-2021-3963478USN
CVE-2022-20565USN

Raw Object

{
  "sha256": "0b53aa354cd832494ba94f3ac6f991437dad93ae3cf793528386c3ba76cd78d3",
  "sha1": "84e94e081e8e5549ee4f807644fc30f23fee92de",
  "md5": "7081ed95d07f59295178aead82f7fa5c",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-aws-tools-4.15.0-1087",
  "filename": "linux-aws-tools-4.15.0-1087_4.15.0-1087.92_amd64.deb",
  "size": 20226,
  "description": "Linux kernel version specific tools for version 4.15.0-1087\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-1087 on\n64 bit x86.\nYou probably want to install linux-tools-4.15.0-1087-<flavour>.",
  "url": null,
  "version": "4.15.0-1087.92",
  "source": "linux-aws",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.4.15.0-1087",
      "sha256": "59874d40d88d1e076ed02105b1ac918ecbb70de2970de16f507993097092df96",
      "sha1": "5eb73bea3603beb0e62c5454c5c6fbb58117827e",
      "md5": "117c8a52bbf7f8abf0b7563011584953",
      "name": "libcpupower.so.4.15.0-1087",
      "size": 79440,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1087/perf",
      "sha256": "2d1d58fb4d81e9744cc8b86039f5d66ceb209c069eeee45b2341585a8c693bec",
      "sha1": "fbd3916ffa359407bac4e17e5e82f4fcfd2d8c36",
      "md5": "55c88845f1be1ead893b0fc947e581a2",
      "name": "perf",
      "size": 18945720,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1087/x86_energy_perf_policy",
      "sha256": "93075820b372dc73b3f2474aedb31d10bf289c65e621ff9874eda6d53f0eae12",
      "sha1": "59125f8118625393adce7b758634ca4cefa9d1c6",
      "md5": "abb9ffb4051096830b6f3bd5603e8d77",
      "name": "x86_energy_perf_policy",
      "size": 38408,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1087/cpupower",
      "sha256": "c0ba10ad90d72999f679f386884ae421c5fc4a1eb00451986da975061acab05a",
      "sha1": "22eb368d6df9ae98b4d75235c6786317d551856f",
      "md5": "4c24b94928cf0581fd366dd47c9490bd",
      "name": "cpupower",
      "size": 295000,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1087/libperf-jvmti.so",
      "sha256": "5c98344a6e6259595fd5bcf181132ca68d13fd58195b5a9b9cc1791d641dd33c",
      "sha1": "13696c2dc47218aaf862d7d4012c1fa1d15ea21b",
      "md5": "6cab0d59ed070232c877450309aa0a42",
      "name": "libperf-jvmti.so",
      "size": 209000,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1087/usbip",
      "sha256": "1d5140ab24930ba892d16bf23c338cb165958d00488b9ca599016495df31ecd2",
      "sha1": "6da80a6670a4486ea72f362653343dde731816ec",
      "md5": "35da994d2fb5d7236fe34d0098538c93",
      "name": "usbip",
      "size": 280616,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1087/turbostat",
      "sha256": "8e82ca09d7960e0462453148ef71e3ed913f0b2ed4952538ba2a1e0aecc5035e",
      "sha1": "f2e8420b9a55c3c21e0cde156c98d491103eae4d",
      "md5": "1a434f28b841ec569acef2a9dcd6f876",
      "name": "turbostat",
      "size": 118984,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1087/usbipd",
      "sha256": "4470ebf31a74a7806231c0b89a2116bd4865bf80ecddc5d0a097c8133a319d40",
      "sha1": "5e2ff8b8a075b2ff16e15c904c8a03c86c3f3356",
      "md5": "40d1cb07caf6585860c52da3d7af7b52",
      "name": "usbipd",
      "size": 214208,
      "description": null,
      "package": 1796163,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:15:31+00:00",
      "updated_at": "2021-03-19T10:15:31+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-0605",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-08-19T02:06:34+00:00",
      "updated_at": "2021-08-19T02:06:34+00:00"
    },
    {
      "name": "CVE-2020-28097",
      "risk": 59,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-08-19T02:15:16+00:00",
      "updated_at": "2021-08-19T02:15:16+00:00"
    },
    {
      "name": "CVE-2020-25284",
      "risk": 41,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-20T18:45:12+00:00",
      "updated_at": "2021-03-20T18:45:12+00:00"
    },
    {
      "name": "CVE-2020-25285",
      "risk": 64,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-20T18:54:13+00:00",
      "updated_at": "2021-03-20T18:54:13+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-20T19:31:51+00:00",
      "updated_at": "2021-03-20T19:31:51+00:00"
    },
    {
      "name": "CVE-2020-14390",
      "risk": 56,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T02:18:26+00:00",
      "updated_at": "2021-03-21T02:18:26+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T03:11:16+00:00",
      "updated_at": "2021-03-21T03:11:16+00:00"
    },
    {
      "name": "CVE-2020-14351",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T03:21:34+00:00",
      "updated_at": "2021-03-21T03:21:34+00:00"
    },
    {
      "name": "CVE-2020-25641",
      "risk": 55,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T03:21:45+00:00",
      "updated_at": "2021-03-21T03:21:45+00:00"
    },
    {
      "name": "CVE-2020-0465",
      "risk": 72,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-21T04:16:21+00:00",
      "updated_at": "2021-03-21T04:16:21+00:00"
    },
    {
      "name": "CVE-2020-28915",
      "risk": 61,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T07:53:54+00:00",
      "updated_at": "2021-03-21T07:53:54+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T12:17:31+00:00",
      "updated_at": "2021-03-21T12:17:31+00:00"
    },
    {
      "name": "CVE-2020-36312",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-06-30T21:08:51+00:00",
      "updated_at": "2021-06-30T21:08:51+00:00"
    },
    {
      "name": "CVE-2021-0448",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-07-19T17:26:29+00:00",
      "updated_at": "2021-07-19T17:26:29+00:00"
    },
    {
      "name": "CVE-2021-1048",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-01-07T03:39:30+00:00",
      "updated_at": "2022-01-07T03:39:30+00:00"
    },
    {
      "name": "CVE-2021-39634",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-01-23T05:43:48+00:00",
      "updated_at": "2022-01-23T05:43:48+00:00"
    },
    {
      "name": "CVE-2022-20565",
      "risk": null,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:25:56+00:00",
      "updated_at": "2023-04-21T09:25:56+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-10-21T06:03:36+00:00",
  "updated_at": "2021-03-19T10:15:30+00:00",
  "deleted_at": null
}