Zercurity data services
  • Summary
  • Applications (7)
  • Packages (0)
  • Vulnerabilities (19)

linux-kvm-tools-4.15.0-1077

Hashes
Linux kernel version specific tools for version 4.15.0-1077 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.15.0-1077 on 64 bit x86. You probably want to install linux-tools-4.15.0-1077-<flavour>.
  • SHA256: 0efe80dd4508d58c48f4cc1e3b10a48a37e044ea3438125c7ad02121417ccbcc
  • SHA1: 850f6ef0a031517bcf3d1ccf54f21825f0c52abc
  • MD5: 247d9b563abc3f574e830f8e3bbeedd1
Information
  • Version: 4.15.0-1077.79
  • Filename: linux-kvm-tools-4.15.0-1077_4.15.0-1077.79_amd64.deb
  • Size: 20012
  • Type: DEB
  • Source: linux-kvm
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.4.15.0-1077
/usr/lib/libcpupower.so.4.15.0-1077
794400
perf
/usr/lib/linux-kvm-tools-4.15.0-1077/perf
189457200
x86_energy_perf_policy
/usr/lib/linux-kvm-tools-4.15.0-1077/x86_energy_perf_policy
384080
cpupower
/usr/lib/linux-kvm-tools-4.15.0-1077/cpupower
2950000
usbip
/usr/lib/linux-kvm-tools-4.15.0-1077/usbip
2806160
turbostat
/usr/lib/linux-kvm-tools-4.15.0-1077/turbostat
1189840
usbipd
/usr/lib/linux-kvm-tools-4.15.0-1077/usbipd
2142080

Vulnerabilities

NameRiskSourceFixed
CVE-2021-060549USN
CVE-2020-2809759USN
CVE-2020-2528441USN
USN-4752-1
CVE-2020-2528564USN
USN-4660-1
CVE-2020-2521160USN
USN-4660-1
CVE-2020-1439056USN
USN-4660-1
CVE-2020-2564575USN
USN-4660-1
CVE-2020-1435178USN
USN-4660-1
CVE-2020-2564155USN
USN-4752-1
CVE-2020-046572USN
CVE-2020-2891561USN
USN-4752-1
CVE-2020-2564375USN
USN-4752-1
CVE-2020-3631255USN
CVE-2021-2915478USN
CVE-2021-349378USN
CVE-2021-04480USN
CVE-2021-104878USN
CVE-2021-3963478USN
CVE-2022-20565USN

Raw Object

{
  "sha256": "0efe80dd4508d58c48f4cc1e3b10a48a37e044ea3438125c7ad02121417ccbcc",
  "sha1": "850f6ef0a031517bcf3d1ccf54f21825f0c52abc",
  "md5": "247d9b563abc3f574e830f8e3bbeedd1",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-kvm-tools-4.15.0-1077",
  "filename": "linux-kvm-tools-4.15.0-1077_4.15.0-1077.79_amd64.deb",
  "size": 20012,
  "description": "Linux kernel version specific tools for version 4.15.0-1077\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-1077 on\n64 bit x86.\nYou probably want to install linux-tools-4.15.0-1077-<flavour>.",
  "url": null,
  "version": "4.15.0-1077.79",
  "source": "linux-kvm",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.4.15.0-1077",
      "sha256": "94fe36bdd831da0493a1b271d0484b63fa4d14a7c5601ef19763604e6c31095d",
      "sha1": "902ab4ff345956f75df94d8c50a4ad4d2b88e1ab",
      "md5": "10dbe5c428b0d53fe1ee0addf479298a",
      "name": "libcpupower.so.4.15.0-1077",
      "size": 79440,
      "description": null,
      "package": 1793786,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T09:25:43+00:00",
      "updated_at": "2021-03-19T09:25:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/perf",
      "sha256": "a2354e0f7d59574004866a33cf37d6bc8cf049602a7599592d31fc72d23950c2",
      "sha1": "a9692efeb3188b19a598fc76ca8d4da8292d26df",
      "md5": "a903779785f32a27cd134663a3586da1",
      "name": "perf",
      "size": 18945720,
      "description": null,
      "package": 1793786,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T09:25:43+00:00",
      "updated_at": "2021-03-19T09:25:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/x86_energy_perf_policy",
      "sha256": "93075820b372dc73b3f2474aedb31d10bf289c65e621ff9874eda6d53f0eae12",
      "sha1": "59125f8118625393adce7b758634ca4cefa9d1c6",
      "md5": "abb9ffb4051096830b6f3bd5603e8d77",
      "name": "x86_energy_perf_policy",
      "size": 38408,
      "description": null,
      "package": 1793786,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T09:25:43+00:00",
      "updated_at": "2021-03-19T09:25:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/cpupower",
      "sha256": "161f61046c6d533dc049acda1f73b11c8619c8c1130537d34b5cbdc7c57db33d",
      "sha1": "d9a774bb8ccf751154cc5ddda1b9c19f5af45563",
      "md5": "432c1005c3f6a91a67c8c993b7d1b7cd",
      "name": "cpupower",
      "size": 295000,
      "description": null,
      "package": 1793786,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T09:25:43+00:00",
      "updated_at": "2021-03-19T09:25:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/usbip",
      "sha256": "27023011346e363153f3843a79efd879ab13cd4a341dc748e5fd6c0804693988",
      "sha1": "b2afe989d5cf77b8b651e76f9358abd448a672ab",
      "md5": "cd03a9358e773e42acc76f3abe2e26d8",
      "name": "usbip",
      "size": 280616,
      "description": null,
      "package": 1793786,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T09:25:43+00:00",
      "updated_at": "2021-03-19T09:25:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/turbostat",
      "sha256": "8e82ca09d7960e0462453148ef71e3ed913f0b2ed4952538ba2a1e0aecc5035e",
      "sha1": "f2e8420b9a55c3c21e0cde156c98d491103eae4d",
      "md5": "1a434f28b841ec569acef2a9dcd6f876",
      "name": "turbostat",
      "size": 118984,
      "description": null,
      "package": 1793786,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T09:25:43+00:00",
      "updated_at": "2021-03-19T09:25:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-4.15.0-1077/usbipd",
      "sha256": "b257620c4ff32f7f773c1261f39db271a7fa3860d0ccd8ce2d6d0f28a053789e",
      "sha1": "eb0772e0add6614fc06be31bae6ec7832abf2e39",
      "md5": "dd9806e0bf205b451994bd3b53658779",
      "name": "usbipd",
      "size": 214208,
      "description": null,
      "package": 1793786,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T09:25:43+00:00",
      "updated_at": "2021-03-19T09:25:43+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-0605",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-08-13T23:54:36+00:00",
      "updated_at": "2021-08-13T23:54:36+00:00"
    },
    {
      "name": "CVE-2020-28097",
      "risk": 59,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-08-13T23:55:04+00:00",
      "updated_at": "2021-08-13T23:55:04+00:00"
    },
    {
      "name": "CVE-2020-25284",
      "risk": 41,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-20T18:45:04+00:00",
      "updated_at": "2021-03-20T18:45:04+00:00"
    },
    {
      "name": "CVE-2020-25285",
      "risk": 64,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-20T18:54:05+00:00",
      "updated_at": "2021-03-20T18:54:05+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-20T19:31:50+00:00",
      "updated_at": "2021-03-20T19:31:50+00:00"
    },
    {
      "name": "CVE-2020-14390",
      "risk": 56,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T02:18:25+00:00",
      "updated_at": "2021-03-21T02:18:25+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T03:11:16+00:00",
      "updated_at": "2021-03-21T03:11:16+00:00"
    },
    {
      "name": "CVE-2020-14351",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T03:21:34+00:00",
      "updated_at": "2021-03-21T03:21:34+00:00"
    },
    {
      "name": "CVE-2020-25641",
      "risk": 55,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T03:21:45+00:00",
      "updated_at": "2021-03-21T03:21:45+00:00"
    },
    {
      "name": "CVE-2020-0465",
      "risk": 72,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-21T04:16:20+00:00",
      "updated_at": "2021-03-21T04:16:20+00:00"
    },
    {
      "name": "CVE-2020-28915",
      "risk": 61,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T07:53:53+00:00",
      "updated_at": "2021-03-21T07:53:53+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T12:17:30+00:00",
      "updated_at": "2021-03-21T12:17:30+00:00"
    },
    {
      "name": "CVE-2020-36312",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-06-30T21:08:51+00:00",
      "updated_at": "2021-06-30T21:08:51+00:00"
    },
    {
      "name": "CVE-2021-29154",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-06-30T21:48:47+00:00",
      "updated_at": "2021-06-30T21:48:47+00:00"
    },
    {
      "name": "CVE-2021-3493",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-06-30T22:22:36+00:00",
      "updated_at": "2021-06-30T22:22:36+00:00"
    },
    {
      "name": "CVE-2021-0448",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-07-19T17:26:28+00:00",
      "updated_at": "2021-07-19T17:26:28+00:00"
    },
    {
      "name": "CVE-2021-1048",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-01-07T03:39:30+00:00",
      "updated_at": "2022-01-07T03:39:30+00:00"
    },
    {
      "name": "CVE-2021-39634",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-01-23T05:43:47+00:00",
      "updated_at": "2022-01-23T05:43:47+00:00"
    },
    {
      "name": "CVE-2022-20565",
      "risk": null,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:25:55+00:00",
      "updated_at": "2023-04-21T09:25:55+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-09-30T15:02:16+00:00",
  "updated_at": "2021-03-19T09:25:42+00:00",
  "deleted_at": null
}