Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (21)

linux-oem-5.14-tools-5.14.0-1042

Hashes
Linux kernel version specific tools for version 5.14.0-1042 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.14.0-1042 on 64 bit x86. You probably want to install linux-tools-5.14.0-1042-<flavour>.
  • SHA256: 0d161ad0171f6ca6bd0e2e11a1f79a9ebd318b485fa03c37ab85b195a8c86470
  • SHA1: 2f2b1d5fb72a3e6147654124005bd7f504462b6b
  • MD5: 178685762ce46b83a342de0bb973111d
Information
  • Version: 5.14.0-1042.47
  • Filename: linux-oem-5.14-tools-5.14.0-1042_5.14.0-1042.47_amd64.deb
  • Size: 31429
  • Type: DEB
  • Source: linux-oem-5.14
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.14.0-1042
/usr/lib/libcpupower.so.5.14.0-1042
989600
usbip
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/usbip
3005360
libperf-jvmti.so
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/libperf-jvmti.so
2362080
turbostat
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/turbostat
1446880
cpupower
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/cpupower
3509440
perf
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/perf
275339120
acpidbg
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/acpidbg
9140480
bpftool
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/bpftool
18845200
usbipd
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/usbipd
2971360
x86_energy_perf_policy
/usr/lib/linux-oem-5.14-tools-5.14.0-1042/x86_energy_perf_policy
473440

Vulnerabilities

Raw Object

{
  "sha256": "0d161ad0171f6ca6bd0e2e11a1f79a9ebd318b485fa03c37ab85b195a8c86470",
  "sha1": "2f2b1d5fb72a3e6147654124005bd7f504462b6b",
  "md5": "178685762ce46b83a342de0bb973111d",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-5.14-tools-5.14.0-1042",
  "filename": "linux-oem-5.14-tools-5.14.0-1042_5.14.0-1042.47_amd64.deb",
  "size": 31429,
  "description": "Linux kernel version specific tools for version 5.14.0-1042\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.14.0-1042 on\n64 bit x86.\nYou probably want to install linux-tools-5.14.0-1042-<flavour>.",
  "url": null,
  "version": "5.14.0-1042.47",
  "source": "linux-oem-5.14",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.14.0-1042",
      "sha256": "87c54209a932a90ea6889059a62e280823e41408db0239c027d7abc5a85ae64c",
      "sha1": "7f5d353c3c6e60b4b70c9b5825aeb0f47ef77f3b",
      "md5": "1d5cf32ffa772faca85fdcdae6708556",
      "name": "libcpupower.so.5.14.0-1042",
      "size": 98960,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:25+00:00",
      "updated_at": "2022-06-08T03:25:25+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/usbip",
      "sha256": "b914da0f55a9dda92f381d48799dbf16f17686c2a81c0d03c9f06e9641aeae2e",
      "sha1": "cebdd92089a4c4e83fe572cb91b7bc5d4a15d691",
      "md5": "2e7bba57cea080c9991c0e4081a8aabb",
      "name": "usbip",
      "size": 300536,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:25+00:00",
      "updated_at": "2022-06-08T03:25:25+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/libperf-jvmti.so",
      "sha256": "147c40c19cdb22ac9d546d3891e9e4930dbe6f9620b4a13069166af4ca46f93d",
      "sha1": "42ca330b1592863e6249423a8c5bf571b2f29272",
      "md5": "a3581363db31b9fe6ce3b99a524b2514",
      "name": "libperf-jvmti.so",
      "size": 236208,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:25+00:00",
      "updated_at": "2022-06-08T03:25:25+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/turbostat",
      "sha256": "df77fabdda15dbb3e8ec4cf33d4ff651412f2fcb8bfad6af25bb934b1e675057",
      "sha1": "4883cd34a176d9ae2624f2f5b38cff971272f110",
      "md5": "a9f228dd78795bb68e84bff428100d0f",
      "name": "turbostat",
      "size": 144688,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:25+00:00",
      "updated_at": "2022-06-08T03:25:25+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/cpupower",
      "sha256": "d1c84b6cfa21606ac22c64fce027a30f4c01c831fb3dfbb83e1c2b171e302f47",
      "sha1": "379b195be21d952e7c04cf17cc3a971bf009f195",
      "md5": "212b562b1cad687e5fc3bc3420a76a43",
      "name": "cpupower",
      "size": 350944,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:25+00:00",
      "updated_at": "2022-06-08T03:25:25+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/perf",
      "sha256": "20dff9fcdb0e40c3f5b5195028b2e9b6e476828e51d6439eb26fc62454a6b2c9",
      "sha1": "6428039d797b203b093cc8e2a8ff8740a1a32763",
      "md5": "0aa1820b5df5c0df18ff679c05068d05",
      "name": "perf",
      "size": 27533912,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:26+00:00",
      "updated_at": "2022-06-08T03:25:26+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/acpidbg",
      "sha256": "f06b2ec6110fa17da7dfb60a0b320c73ab4bfe30c71223307846001bc030f8fb",
      "sha1": "693f5356dc5f2fefcbef7dd0aa5f408a3e5e30ae",
      "md5": "c1ce36995dbfde1c313ec66295b07034",
      "name": "acpidbg",
      "size": 914048,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:26+00:00",
      "updated_at": "2022-06-08T03:25:26+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/bpftool",
      "sha256": "b81c3b62966db28909794b4bd1ffd7adf8eb98a7029537ab0fd0984f523c6969",
      "sha1": "21ed69ea98dd3b4ab3e2ffbb31bafb8f00464e10",
      "md5": "26612361c773ed1793ea24042e6b4f1f",
      "name": "bpftool",
      "size": 1884520,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:26+00:00",
      "updated_at": "2022-06-08T03:25:26+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/usbipd",
      "sha256": "eab0b4ef31ded7953080199a04b1308ccdf1e10bf668b74a77376074c47f828a",
      "sha1": "517a28f0a999965a66724dbc4aed1e6628c9921b",
      "md5": "c97745d2fd6db45882f1c810d5b6ec7a",
      "name": "usbipd",
      "size": 297136,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:26+00:00",
      "updated_at": "2022-06-08T03:25:26+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1042/x86_energy_perf_policy",
      "sha256": "41121c3c7d4a30bd96fc7c98d6174b8cf5f4c1f1e9c342a0320336c9eb85e33e",
      "sha1": "bd3f89068a581a39950d99359fe7b357294e3d74",
      "md5": "30594cee1fca84952911e5cf60620df2",
      "name": "x86_energy_perf_policy",
      "size": 47344,
      "description": null,
      "package": 3765747,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-08T03:25:26+00:00",
      "updated_at": "2022-06-08T03:25:26+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:04:05+00:00",
      "updated_at": "2023-02-18T11:04:05+00:00"
    },
    {
      "name": "CVE-2022-21166",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-02T03:42:49+00:00",
      "updated_at": "2022-07-02T03:42:49+00:00"
    },
    {
      "name": "CVE-2022-21125",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-02T03:43:02+00:00",
      "updated_at": "2022-07-02T03:43:02+00:00"
    },
    {
      "name": "CVE-2022-21123",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-07-02T03:46:14+00:00",
      "updated_at": "2022-07-02T03:46:14+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "374aa277d30ed4f0a8491dd59ecc48d258483f9bf4fc04ef4d936ebc9d88514c",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1048.55",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1048.55_all.deb"
      },
      "created_at": "2022-08-11T03:03:53+00:00",
      "updated_at": "2022-08-11T03:03:53+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "374aa277d30ed4f0a8491dd59ecc48d258483f9bf4fc04ef4d936ebc9d88514c",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1048.55",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1048.55_all.deb"
      },
      "created_at": "2022-08-11T03:16:10+00:00",
      "updated_at": "2022-08-11T03:16:10+00:00"
    },
    {
      "name": "CVE-2022-2585",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "374aa277d30ed4f0a8491dd59ecc48d258483f9bf4fc04ef4d936ebc9d88514c",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1048.55",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1048.55_all.deb"
      },
      "created_at": "2022-08-11T03:57:42+00:00",
      "updated_at": "2022-08-11T03:57:42+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:20:02+00:00",
      "updated_at": "2022-08-14T02:20:02+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:21:09+00:00",
      "updated_at": "2022-08-14T02:21:09+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:21:19+00:00",
      "updated_at": "2022-08-14T02:21:19+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:21:27+00:00",
      "updated_at": "2022-08-14T02:21:27+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:22:11+00:00",
      "updated_at": "2022-08-14T02:22:11+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:22:11+00:00",
      "updated_at": "2022-08-14T02:22:11+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:23:53+00:00",
      "updated_at": "2022-08-14T02:23:53+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:26:04+00:00",
      "updated_at": "2022-08-14T02:26:04+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:27:23+00:00",
      "updated_at": "2022-08-14T02:27:23+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:32:00+00:00",
      "updated_at": "2022-08-14T02:32:00+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:54:13+00:00",
      "updated_at": "2023-02-18T11:54:13+00:00"
    },
    {
      "name": "CVE-2022-3077",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T12:10:38+00:00",
      "updated_at": "2023-02-18T12:10:38+00:00"
    },
    {
      "name": "CVE-2022-2959",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T12:30:27+00:00",
      "updated_at": "2023-02-18T12:30:27+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-07T11:46:36+00:00",
      "updated_at": "2023-03-07T11:46:36+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-03T19:47:09+00:00",
  "updated_at": "2022-06-08T02:25:24+00:00",
  "deleted_at": null
}