21374f0d428977d7503729e30967b348309ef47501853254fa4f07543e014d0e
f5dc74f0aa284a43fa51ac7095f1df2ca9acbe8b
2925ffbed25624e18e422e89ef30b2d7
5.4.0-1064.68
linux-gkeop-tools-5.4.0-1064_5.4.0-1064.68_amd64.deb
24506
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1064 /usr/lib/libcpupower.so.5.4.0-1064 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1064/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1064/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1064/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1064/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1064/perf | 21844784 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1064/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1064/bpftool | 552696 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1064/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1064/x86_energy_perf_policy | 38544 | 0 |
{ "sha256": "21374f0d428977d7503729e30967b348309ef47501853254fa4f07543e014d0e", "sha1": "f5dc74f0aa284a43fa51ac7095f1df2ca9acbe8b", "md5": "2925ffbed25624e18e422e89ef30b2d7", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1064", "filename": "linux-gkeop-tools-5.4.0-1064_5.4.0-1064.68_amd64.deb", "size": 24506, "description": "Linux kernel version specific tools for version 5.4.0-1064\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1064 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1064-<flavour>.", "url": null, "version": "5.4.0-1064.68", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1064", "sha256": "3c7c60748e58d78134e0d28fd07f0e0b6708d7dc3f79d602627e8538a8f7060f", "sha1": "b3b4b5a6c2064059925e68b508fa1f2003e90d3d", "md5": "8879b4bda64b5c6ca6f0187e76f538d1", "name": "libcpupower.so.5.4.0-1064", "size": 97800, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:22+00:00", "updated_at": "2023-02-11T11:52:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/usbip", "sha256": "edfc9b468852d18e824b830a380afdee78f418ebc415697c4759d38ff8f20f4a", "sha1": "ecbf2f2913e7f2e475f823e5b4bc777d36b01eb2", "md5": "b5020f5d5e4af88089893d9059f1c7ed", "name": "usbip", "size": 300512, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:22+00:00", "updated_at": "2023-02-11T11:52:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/libperf-jvmti.so", "sha256": "3fd87262461a04b0e109fd292ab3b37b6c195981d39cffce2d128fcf3d0eae6a", "sha1": "c20a74739c4844ac1ae2425f33142489ea454092", "md5": "ca5f007ba0ecb73efb25e7add09a4199", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:22+00:00", "updated_at": "2023-02-11T11:52:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:22+00:00", "updated_at": "2023-02-11T11:52:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/cpupower", "sha256": "4f3802cfe88affd2e07a69179ecd026111d2d8a703e7e708ef607b1df86f38ba", "sha1": "eb599e0b7125856581d05704bbc75bd3d2f9d32f", "md5": "703ef3f875ad9c7ed470d277ae1dd964", "name": "cpupower", "size": 337952, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:22+00:00", "updated_at": "2023-02-11T11:52:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/perf", "sha256": "2140567f850fcb9d72630cc0ff79341f0a4bfc1e0751d499715d7e7182f95ae4", "sha1": "4d45bc693d7843903b39a836a2a8ffdebbad4838", "md5": "60f101e7eb1fd2449e60abce5bdd0a8f", "name": "perf", "size": 21844784, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:23+00:00", "updated_at": "2023-02-11T11:52:23+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/acpidbg", "sha256": "e89f7a6bbed5f66bc9beb5f027b25415d1d90406de15dd27271406353be0c852", "sha1": "9e9abfaac2444cbf0db3a536dfeaf83a2d86ea15", "md5": "f4b5cdaa57386274b01b1b74e2231ef8", "name": "acpidbg", "size": 914040, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:23+00:00", "updated_at": "2023-02-11T11:52:23+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/bpftool", "sha256": "77336dd319948ca3cd8b10d912927fc642c9b6af74e1c8f2c07cd7507de65af4", "sha1": "b1be467f9f4930bb85f967d3385b5c51ca9e68bd", "md5": "f84fbaf6425e65e49b8d0333f87ba5f5", "name": "bpftool", "size": 552696, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:23+00:00", "updated_at": "2023-02-11T11:52:23+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/usbipd", "sha256": "aaf0f25877b97be7f98746967a528b6475cadc06bb55468ff6ba466a47febc99", "sha1": "cb890c4816189fa827f99d2fd5430f0ffda54249", "md5": "0aaf2a442eeda5a04ee85fb63c28d6dc", "name": "usbipd", "size": 297128, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:23+00:00", "updated_at": "2023-02-11T11:52:23+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1064/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 5134039, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:52:23+00:00", "updated_at": "2023-02-11T11:52:23+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2023-0045", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:40:13+00:00", "updated_at": "2023-03-04T10:40:13+00:00" }, { "name": "CVE-2022-3435", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:41:11+00:00", "updated_at": "2023-03-04T10:41:11+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:41:47+00:00", "updated_at": "2023-03-04T10:41:47+00:00" }, { "name": "CVE-2023-0461", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:45:40+00:00", "updated_at": "2023-03-04T10:45:40+00:00" }, { "name": "CVE-2022-3521", "risk": 25, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:46:55+00:00", "updated_at": "2023-03-04T10:46:55+00:00" }, { "name": "CVE-2022-42329", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:47:05+00:00", "updated_at": "2023-03-04T10:47:05+00:00" }, { "name": "CVE-2022-4139", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:47:11+00:00", "updated_at": "2023-03-04T10:47:11+00:00" }, { "name": "CVE-2022-47520", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:48:12+00:00", "updated_at": "2023-03-04T10:48:12+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:48:17+00:00", "updated_at": "2023-03-04T10:48:17+00:00" }, { "name": "CVE-2022-3169", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:48:23+00:00", "updated_at": "2023-03-04T10:48:23+00:00" }, { "name": "CVE-2022-3424", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:48:47+00:00", "updated_at": "2023-03-04T10:48:47+00:00" }, { "name": "CVE-2023-20938", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:49:07+00:00", "updated_at": "2023-03-04T10:49:07+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:59:08+00:00", "updated_at": "2023-03-04T10:59:08+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T10:59:39+00:00", "updated_at": "2023-03-04T10:59:39+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T11:10:55+00:00", "updated_at": "2023-03-04T11:10:55+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T11:10:59+00:00", "updated_at": "2023-03-04T11:10:59+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T11:11:11+00:00", "updated_at": "2023-03-04T11:11:11+00:00" }, { "name": "CVE-2022-42328", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T11:12:55+00:00", "updated_at": "2023-03-04T11:12:55+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T11:13:27+00:00", "updated_at": "2023-03-04T11:13:27+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-03-04T11:13:31+00:00", "updated_at": "2023-03-04T11:13:31+00:00" }, { "name": "CVE-2023-28328", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-04-21T09:24:43+00:00", "updated_at": "2023-04-21T09:24:43+00:00" }, { "name": "CVE-2023-26607", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-04-21T09:25:14+00:00", "updated_at": "2023-04-21T09:25:14+00:00" }, { "name": "CVE-2023-1382", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-04-21T09:29:29+00:00", "updated_at": "2023-04-21T09:29:29+00:00" }, { "name": "CVE-2023-2166", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1065.69", "filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb" }, "created_at": "2023-06-06T10:07:08+00:00", "updated_at": "2023-06-06T10:07:08+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-01-25T15:32:09+00:00", "updated_at": "2023-02-11T11:52:21+00:00", "deleted_at": null }