0efe80dd4508d58c48f4cc1e3b10a48a37e044ea3438125c7ad02121417ccbcc
850f6ef0a031517bcf3d1ccf54f21825f0c52abc
247d9b563abc3f574e830f8e3bbeedd1
4.15.0-1077.79
linux-kvm-tools-4.15.0-1077_4.15.0-1077.79_amd64.deb
20012
DEB
linux-kvm
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.4.15.0-1077 /usr/lib/libcpupower.so.4.15.0-1077 | 79440 | 0 | ||
perf /usr/lib/linux-kvm-tools-4.15.0-1077/perf | 18945720 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-kvm-tools-4.15.0-1077/x86_energy_perf_policy | 38408 | 0 | ||
cpupower /usr/lib/linux-kvm-tools-4.15.0-1077/cpupower | 295000 | 0 | ||
usbip /usr/lib/linux-kvm-tools-4.15.0-1077/usbip | 280616 | 0 | ||
turbostat /usr/lib/linux-kvm-tools-4.15.0-1077/turbostat | 118984 | 0 | ||
usbipd /usr/lib/linux-kvm-tools-4.15.0-1077/usbipd | 214208 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-0605 | 49 | USN | |
CVE-2020-28097 | 59 | USN | |
CVE-2020-25284 | 41 | USN USN-4752-1 | |
CVE-2020-25285 | 64 | USN USN-4660-1 | |
CVE-2020-25211 | 60 | USN USN-4660-1 | |
CVE-2020-14390 | 56 | USN USN-4660-1 | |
CVE-2020-25645 | 75 | USN USN-4660-1 | |
CVE-2020-14351 | 78 | USN USN-4660-1 | |
CVE-2020-25641 | 55 | USN USN-4752-1 | |
CVE-2020-0465 | 72 | USN | |
CVE-2020-28915 | 61 | USN USN-4752-1 | |
CVE-2020-25643 | 75 | USN USN-4752-1 | |
CVE-2020-36312 | 55 | USN | |
CVE-2021-29154 | 78 | USN | |
CVE-2021-3493 | 78 | USN | |
CVE-2021-0448 | 0 | USN | |
CVE-2021-1048 | 78 | USN | |
CVE-2021-39634 | 78 | USN | |
CVE-2022-20565 | USN |
{ "sha256": "0efe80dd4508d58c48f4cc1e3b10a48a37e044ea3438125c7ad02121417ccbcc", "sha1": "850f6ef0a031517bcf3d1ccf54f21825f0c52abc", "md5": "247d9b563abc3f574e830f8e3bbeedd1", "type": "DEB", "arch": "AMD64", "name": "linux-kvm-tools-4.15.0-1077", "filename": "linux-kvm-tools-4.15.0-1077_4.15.0-1077.79_amd64.deb", "size": 20012, "description": "Linux kernel version specific tools for version 4.15.0-1077\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-1077 on\n64 bit x86.\nYou probably want to install linux-tools-4.15.0-1077-<flavour>.", "url": null, "version": "4.15.0-1077.79", "source": "linux-kvm", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.4.15.0-1077", "sha256": "94fe36bdd831da0493a1b271d0484b63fa4d14a7c5601ef19763604e6c31095d", "sha1": "902ab4ff345956f75df94d8c50a4ad4d2b88e1ab", "md5": "10dbe5c428b0d53fe1ee0addf479298a", "name": "libcpupower.so.4.15.0-1077", "size": 79440, "description": null, "package": 1793786, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-19T09:25:43+00:00", "updated_at": "2021-03-19T09:25:43+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/perf", "sha256": "a2354e0f7d59574004866a33cf37d6bc8cf049602a7599592d31fc72d23950c2", "sha1": "a9692efeb3188b19a598fc76ca8d4da8292d26df", "md5": "a903779785f32a27cd134663a3586da1", "name": "perf", "size": 18945720, "description": null, "package": 1793786, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-19T09:25:43+00:00", "updated_at": "2021-03-19T09:25:43+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/x86_energy_perf_policy", "sha256": "93075820b372dc73b3f2474aedb31d10bf289c65e621ff9874eda6d53f0eae12", "sha1": "59125f8118625393adce7b758634ca4cefa9d1c6", "md5": "abb9ffb4051096830b6f3bd5603e8d77", "name": "x86_energy_perf_policy", "size": 38408, "description": null, "package": 1793786, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-19T09:25:43+00:00", "updated_at": "2021-03-19T09:25:43+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/cpupower", "sha256": "161f61046c6d533dc049acda1f73b11c8619c8c1130537d34b5cbdc7c57db33d", "sha1": "d9a774bb8ccf751154cc5ddda1b9c19f5af45563", "md5": "432c1005c3f6a91a67c8c993b7d1b7cd", "name": "cpupower", "size": 295000, "description": null, "package": 1793786, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-19T09:25:43+00:00", "updated_at": "2021-03-19T09:25:43+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/usbip", "sha256": "27023011346e363153f3843a79efd879ab13cd4a341dc748e5fd6c0804693988", "sha1": "b2afe989d5cf77b8b651e76f9358abd448a672ab", "md5": "cd03a9358e773e42acc76f3abe2e26d8", "name": "usbip", "size": 280616, "description": null, "package": 1793786, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-19T09:25:43+00:00", "updated_at": "2021-03-19T09:25:43+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/turbostat", "sha256": "8e82ca09d7960e0462453148ef71e3ed913f0b2ed4952538ba2a1e0aecc5035e", "sha1": "f2e8420b9a55c3c21e0cde156c98d491103eae4d", "md5": "1a434f28b841ec569acef2a9dcd6f876", "name": "turbostat", "size": 118984, "description": null, "package": 1793786, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-19T09:25:43+00:00", "updated_at": "2021-03-19T09:25:43+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/usbipd", "sha256": "b257620c4ff32f7f773c1261f39db271a7fa3860d0ccd8ce2d6d0f28a053789e", "sha1": "eb0772e0add6614fc06be31bae6ec7832abf2e39", "md5": "dd9806e0bf205b451994bd3b53658779", "name": "usbipd", "size": 214208, "description": null, "package": 1793786, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-19T09:25:43+00:00", "updated_at": "2021-03-19T09:25:43+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-0605", "risk": 49, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-08-13T23:54:36+00:00", "updated_at": "2021-08-13T23:54:36+00:00" }, { "name": "CVE-2020-28097", "risk": 59, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-08-13T23:55:04+00:00", "updated_at": "2021-08-13T23:55:04+00:00" }, { "name": "CVE-2020-25284", "risk": 41, "source": "USN", "sid": "USN-4752-1", "fixed": null, "created_at": "2021-03-20T18:45:04+00:00", "updated_at": "2021-03-20T18:45:04+00:00" }, { "name": "CVE-2020-25285", "risk": 64, "source": "USN", "sid": "USN-4660-1", "fixed": null, "created_at": "2021-03-20T18:54:05+00:00", "updated_at": "2021-03-20T18:54:05+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "USN", "sid": "USN-4660-1", "fixed": null, "created_at": "2021-03-20T19:31:50+00:00", "updated_at": "2021-03-20T19:31:50+00:00" }, { "name": "CVE-2020-14390", "risk": 56, "source": "USN", "sid": "USN-4660-1", "fixed": null, "created_at": "2021-03-21T02:18:25+00:00", "updated_at": "2021-03-21T02:18:25+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "USN", "sid": "USN-4660-1", "fixed": null, "created_at": "2021-03-21T03:11:16+00:00", "updated_at": "2021-03-21T03:11:16+00:00" }, { "name": "CVE-2020-14351", "risk": 78, "source": "USN", "sid": "USN-4660-1", "fixed": null, "created_at": "2021-03-21T03:21:34+00:00", "updated_at": "2021-03-21T03:21:34+00:00" }, { "name": "CVE-2020-25641", "risk": 55, "source": "USN", "sid": "USN-4752-1", "fixed": null, "created_at": "2021-03-21T03:21:45+00:00", "updated_at": "2021-03-21T03:21:45+00:00" }, { "name": "CVE-2020-0465", "risk": 72, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-03-21T04:16:20+00:00", "updated_at": "2021-03-21T04:16:20+00:00" }, { "name": "CVE-2020-28915", "risk": 61, "source": "USN", "sid": "USN-4752-1", "fixed": null, "created_at": "2021-03-21T07:53:53+00:00", "updated_at": "2021-03-21T07:53:53+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "USN", "sid": "USN-4752-1", "fixed": null, "created_at": "2021-03-21T12:17:30+00:00", "updated_at": "2021-03-21T12:17:30+00:00" }, { "name": "CVE-2020-36312", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-30T21:08:51+00:00", "updated_at": "2021-06-30T21:08:51+00:00" }, { "name": "CVE-2021-29154", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-30T21:48:47+00:00", "updated_at": "2021-06-30T21:48:47+00:00" }, { "name": "CVE-2021-3493", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-30T22:22:36+00:00", "updated_at": "2021-06-30T22:22:36+00:00" }, { "name": "CVE-2021-0448", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-19T17:26:28+00:00", "updated_at": "2021-07-19T17:26:28+00:00" }, { "name": "CVE-2021-1048", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-01-07T03:39:30+00:00", "updated_at": "2022-01-07T03:39:30+00:00" }, { "name": "CVE-2021-39634", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-01-23T05:43:47+00:00", "updated_at": "2022-01-23T05:43:47+00:00" }, { "name": "CVE-2022-20565", "risk": null, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:25:55+00:00", "updated_at": "2023-04-21T09:25:55+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2020-09-30T15:02:16+00:00", "updated_at": "2021-03-19T09:25:42+00:00", "deleted_at": null }