Zercurity data services
  • Summary
  • Applications (7)
  • Packages (0)
  • Vulnerabilities (9)

linux-oem-tools-4.13.0-1008

Hashes
Linux kernel version specific tools for version 4.13.0-1008 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.13.0-1008 on 64 bit x86. You probably want to install linux-tools-4.13.0-1008-<flavour>.
  • SHA256: 1f4ace4256cefda55c575e49973a2208ef17a54f6821918e9818a2f374f0f815
  • SHA1: 2910ad58b3779c988baf85c28b9fd56c3ae8ca35
  • MD5: 4ab478b0c735d59f82eda5d5fa7257fd
Information
  • Version: 4.13.0-1008.9
  • Filename: linux-oem-tools-4.13.0-1008_4.13.0-1008.9_amd64.deb
  • Size: 4030
  • Type: DEB
  • Source: linux-oem
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils (>= 2.26.1), binutils (<< 2.27), libaudit1 (>= 1:2.2.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1, libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.4.13.0-1008
/usr/lib/libcpupower.so.4.13.0-1008
227040
usbip
/usr/lib/linux-oem-tools-4.13.0-1008/usbip
681520
turbostat
/usr/lib/linux-oem-tools-4.13.0-1008/turbostat
1060400
cpupower
/usr/lib/linux-oem-tools-4.13.0-1008/cpupower
720880
perf
/usr/lib/linux-oem-tools-4.13.0-1008/perf
37249280
usbipd
/usr/lib/linux-oem-tools-4.13.0-1008/usbipd
561120
x86_energy_perf_policy
/usr/lib/linux-oem-tools-4.13.0-1008/x86_energy_perf_policy
316080

Vulnerabilities

NameRiskSourceFixed
CVE-2017-1530655USN
CVE-2017-100040570USN
CVE-2017-1219355USN
CVE-2017-1595178USN
CVE-2017-1512855USN
CVE-2017-1693978USN
USN-3507-2
CVE-2017-1664372USN
USN-3754-1
CVE-2017-1529955USN
USN-3798-2
CVE-2017-1653572USN
USN-3754-1

Raw Object

{
  "sha256": "1f4ace4256cefda55c575e49973a2208ef17a54f6821918e9818a2f374f0f815",
  "sha1": "2910ad58b3779c988baf85c28b9fd56c3ae8ca35",
  "md5": "4ab478b0c735d59f82eda5d5fa7257fd",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-tools-4.13.0-1008",
  "filename": "linux-oem-tools-4.13.0-1008_4.13.0-1008.9_amd64.deb",
  "size": 4030,
  "description": "Linux kernel version specific tools for version 4.13.0-1008\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.13.0-1008 on\n64 bit x86.\nYou probably want to install linux-tools-4.13.0-1008-<flavour>.",
  "url": null,
  "version": "4.13.0-1008.9",
  "source": "linux-oem",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils (>= 2.26.1), binutils (<< 2.27), libaudit1 (>= 1:2.2.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1, libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.4.13.0-1008",
      "sha256": "6e8720b26eb9b51f4d3ebb5cb127fb86ebcdb792e21c9877183f42ad25f8d323",
      "sha1": "e6c8b7d3d5e8e61d9fe71ed6da8772a7e53149ca",
      "md5": "edbe91728d8fb70d58645db9d41d396f",
      "name": "libcpupower.so.4.13.0-1008",
      "size": 22704,
      "description": null,
      "package": 400241,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T16:21:55+00:00",
      "updated_at": "2021-03-04T16:21:55+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1008/usbip",
      "sha256": "d2942d4f586493f2843862dc5177f2872d724f64db2f4137b879af344a6b8bd1",
      "sha1": "11d959fd57bf7e7a77fd11f70104a7f1dd846689",
      "md5": "a870011c212423f3a77e04f95a130605",
      "name": "usbip",
      "size": 68152,
      "description": null,
      "package": 400241,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T16:21:55+00:00",
      "updated_at": "2021-03-04T16:21:55+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1008/turbostat",
      "sha256": "c6cd553b9f3576d85d4551ecf5859058daaf93f871899108a33b0e011330f9f0",
      "sha1": "2c28acbc0805d65cd7fd0d55b96b2f5d64fc63b2",
      "md5": "2f73fc912012dcda9258433d3ee6d996",
      "name": "turbostat",
      "size": 106040,
      "description": null,
      "package": 400241,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T16:21:55+00:00",
      "updated_at": "2021-03-04T16:21:55+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1008/cpupower",
      "sha256": "fb60fa1af7ab01fc1f3975cc6cb03c9723b4f582f39d209d42e332607eca74d1",
      "sha1": "8df16ead70180e20fd357f2db74074f3488c3934",
      "md5": "07a1e7b2fa129ff32c471121d4fb106a",
      "name": "cpupower",
      "size": 72088,
      "description": null,
      "package": 400241,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T16:21:55+00:00",
      "updated_at": "2021-03-04T16:21:55+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1008/perf",
      "sha256": "5312b66cf2696ab44a6e67ada1767a0c00e3122f479e0a263a24c95ed463e5c4",
      "sha1": "19476a6506398968e28f47aff32f8f89870e4ffa",
      "md5": "174edd50dc2547b1ebedae2fdd0348c6",
      "name": "perf",
      "size": 3724928,
      "description": null,
      "package": 400241,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T16:21:55+00:00",
      "updated_at": "2021-03-04T16:21:55+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1008/usbipd",
      "sha256": "0cec13388b2d12ece78413ca69a500c07375a7a3da70505e345fec7011e93eaa",
      "sha1": "10c0b91e4b55a9ce28b0acfba8e1efc226f1c749",
      "md5": "0666787972629d24562da0af1def6db0",
      "name": "usbipd",
      "size": 56112,
      "description": null,
      "package": 400241,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T16:21:55+00:00",
      "updated_at": "2021-03-04T16:21:55+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1008/x86_energy_perf_policy",
      "sha256": "604bfcd921ee84b74cd4ecf64c2c65e50920e2de7a89f9ccd595997e21424f82",
      "sha1": "f968ce2127d7c2afb00be35958d714534041fc3a",
      "md5": "cfcef032663227d1ed14a03dd21450f5",
      "name": "x86_energy_perf_policy",
      "size": 31608,
      "description": null,
      "package": 400241,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T16:21:55+00:00",
      "updated_at": "2021-03-04T16:21:55+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2017-15306",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T11:05:21+00:00",
      "updated_at": "2021-03-10T11:05:21+00:00"
    },
    {
      "name": "CVE-2017-1000405",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T12:38:33+00:00",
      "updated_at": "2021-03-10T12:38:33+00:00"
    },
    {
      "name": "CVE-2017-12193",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T13:33:26+00:00",
      "updated_at": "2021-03-10T13:33:26+00:00"
    },
    {
      "name": "CVE-2017-15951",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T19:21:18+00:00",
      "updated_at": "2021-03-10T19:21:18+00:00"
    },
    {
      "name": "CVE-2017-15128",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-21T21:20:59+00:00",
      "updated_at": "2021-03-21T21:20:59+00:00"
    },
    {
      "name": "CVE-2017-16939",
      "risk": 78,
      "source": "USN",
      "sid": "USN-3507-2",
      "fixed": null,
      "created_at": "2021-03-22T06:54:10+00:00",
      "updated_at": "2021-03-22T06:54:10+00:00"
    },
    {
      "name": "CVE-2017-16643",
      "risk": 72,
      "source": "USN",
      "sid": "USN-3754-1",
      "fixed": null,
      "created_at": "2021-03-22T08:27:21+00:00",
      "updated_at": "2021-03-22T08:27:21+00:00"
    },
    {
      "name": "CVE-2017-15299",
      "risk": 55,
      "source": "USN",
      "sid": "USN-3798-2",
      "fixed": null,
      "created_at": "2021-03-22T12:08:34+00:00",
      "updated_at": "2021-03-22T12:08:34+00:00"
    },
    {
      "name": "CVE-2017-16535",
      "risk": 72,
      "source": "USN",
      "sid": "USN-3754-1",
      "fixed": null,
      "created_at": "2021-03-22T15:56:56+00:00",
      "updated_at": "2021-03-22T15:56:56+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2017-11-16T13:51:35+00:00",
  "updated_at": "2021-03-04T16:21:55+00:00",
  "deleted_at": null
}