Zercurity data services
  • Summary
  • Applications (8)
  • Packages (0)
  • Vulnerabilities (25)

linux-gcp-tools-5.15.0-1016

Hashes
Linux kernel version specific tools for version 5.15.0-1016 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.15.0-1016 on 64 bit x86. You probably want to install linux-tools-5.15.0-1016-<flavour>.
  • SHA256: 26090f7d5ebbd5b0209a721d518a4bc0f11f10f68fdd39b96baedd83580c902b
  • SHA1: 3033a837b7e4b3cbf1afbfb0b55612c5edfe5be2
  • MD5: 6cc090d84f5df51e6c5bed58c0b12ad4
Information
  • Version: 5.15.0-1016.21
  • Filename: linux-gcp-tools-5.15.0-1016_5.15.0-1016.21_amd64.deb
  • Size: 24852
  • Type: DEB
  • Source: linux-gcp
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.15.0-1016
/usr/lib/libcpupower.so.5.15.0-1016
817840
usbip
/usr/lib/linux-gcp-tools-5.15.0-1016/usbip
2489360
turbostat
/usr/lib/linux-gcp-tools-5.15.0-1016/turbostat
1435360
cpupower
/usr/lib/linux-gcp-tools-5.15.0-1016/cpupower
2944160
perf
/usr/lib/linux-gcp-tools-5.15.0-1016/perf
223492080
bpftool
/usr/lib/linux-gcp-tools-5.15.0-1016/bpftool
15928960
usbipd
/usr/lib/linux-gcp-tools-5.15.0-1016/usbipd
2493360
x86_energy_perf_policy
/usr/lib/linux-gcp-tools-5.15.0-1016/x86_energy_perf_policy
466080

Vulnerabilities

Raw Object

{
  "sha256": "26090f7d5ebbd5b0209a721d518a4bc0f11f10f68fdd39b96baedd83580c902b",
  "sha1": "3033a837b7e4b3cbf1afbfb0b55612c5edfe5be2",
  "md5": "6cc090d84f5df51e6c5bed58c0b12ad4",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gcp-tools-5.15.0-1016",
  "filename": "linux-gcp-tools-5.15.0-1016_5.15.0-1016.21_amd64.deb",
  "size": 24852,
  "description": "Linux kernel version specific tools for version 5.15.0-1016\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1016 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1016-<flavour>.",
  "url": null,
  "version": "5.15.0-1016.21",
  "source": "linux-gcp",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.15.0-1016",
      "sha256": "fd82e40f977bad263021ff281e525abeb4e695ebd7e17cc907d5ba136a2ee09c",
      "sha1": "43332e303c4e8791b9dddb9e3a40aea25bf635e8",
      "md5": "c5d6f1fcb9eda2f5214e476a0a39fa43",
      "name": "libcpupower.so.5.15.0-1016",
      "size": 81784,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:38+00:00",
      "updated_at": "2022-08-10T04:14:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/usbip",
      "sha256": "87bc10464f8ce5ec4a4262ab4ee72dbfd45b3778d40957b2732a24adc91ff426",
      "sha1": "4ff52ec947e3f30a439c4fd2b4c3383fae00f402",
      "md5": "baf456689c4a27c186e82d83ab857510",
      "name": "usbip",
      "size": 248936,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:38+00:00",
      "updated_at": "2022-08-10T04:14:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/turbostat",
      "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206",
      "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b",
      "md5": "74e235bf371ac5db13aeeacee0cc7acd",
      "name": "turbostat",
      "size": 143536,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:38+00:00",
      "updated_at": "2022-08-10T04:14:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/cpupower",
      "sha256": "5e283a74293bd056fd13e34d9756973b0660410a89240f81bb1d9692b831a542",
      "sha1": "764ce0f80a45039a6109192a2b7a07d6657f7ebd",
      "md5": "e2cec1738cc9852857713a92f0582e1f",
      "name": "cpupower",
      "size": 294416,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:38+00:00",
      "updated_at": "2022-08-10T04:14:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/perf",
      "sha256": "22f59e76a9a864b0a85c5ec8dc68d16e06bc6699b94ec0c55827df86d6ae7ce0",
      "sha1": "b268f7af384c3751c217735fe7d4fb72020fec61",
      "md5": "628adcdd2677effb3d8e99199f3edd33",
      "name": "perf",
      "size": 22349208,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:38+00:00",
      "updated_at": "2022-08-10T04:14:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/bpftool",
      "sha256": "5b2466d7ea7e061d59dc88043809497b097b811e3f2acdfc78b11e0a59ef4130",
      "sha1": "855d86ea26cd802305fd1bbcc81ac88a11c338fc",
      "md5": "28d3313e0d779b22bd0b8bd790b55815",
      "name": "bpftool",
      "size": 1592896,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:39+00:00",
      "updated_at": "2022-08-10T04:14:39+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/usbipd",
      "sha256": "a10af808c40e6418ee59951b3405acbd8f3a9942a15c971cf908991aa37f777f",
      "sha1": "c83ae6936936e3d9a1a624eaa32ec2aba71288e1",
      "md5": "fdce39747acc0d6042aab5e2505818e8",
      "name": "usbipd",
      "size": 249336,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:39+00:00",
      "updated_at": "2022-08-10T04:14:39+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/x86_energy_perf_policy",
      "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543",
      "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b",
      "md5": "b22454323232ae918c7ea0cc55df6557",
      "name": "x86_energy_perf_policy",
      "size": 46608,
      "description": null,
      "package": 3904719,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:14:39+00:00",
      "updated_at": "2022-08-10T04:14:39+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:17:19+00:00",
      "updated_at": "2022-09-16T16:17:19+00:00"
    },
    {
      "name": "CVE-2022-1973",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:55:07+00:00",
      "updated_at": "2022-09-16T16:55:07+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:55:16+00:00",
      "updated_at": "2022-09-16T16:55:16+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:55:25+00:00",
      "updated_at": "2022-09-16T16:55:25+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:07:02+00:00",
      "updated_at": "2022-09-16T17:07:02+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:07:33+00:00",
      "updated_at": "2022-09-16T17:07:33+00:00"
    },
    {
      "name": "CVE-2022-1943",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:11:16+00:00",
      "updated_at": "2022-09-16T17:11:16+00:00"
    },
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:12:51+00:00",
      "updated_at": "2022-09-16T17:12:51+00:00"
    },
    {
      "name": "CVE-2022-2959",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:13:03+00:00",
      "updated_at": "2022-09-16T17:13:03+00:00"
    },
    {
      "name": "CVE-2022-42720",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T17:14:56+00:00",
      "updated_at": "2022-10-20T17:14:56+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T17:25:07+00:00",
      "updated_at": "2022-10-20T17:25:07+00:00"
    },
    {
      "name": "CVE-2022-42721",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T18:10:44+00:00",
      "updated_at": "2022-10-20T18:10:44+00:00"
    },
    {
      "name": "CVE-2022-41674",
      "risk": 81,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T18:33:21+00:00",
      "updated_at": "2022-10-20T18:33:21+00:00"
    },
    {
      "name": "CVE-2022-42722",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T18:46:24+00:00",
      "updated_at": "2022-10-20T18:46:24+00:00"
    },
    {
      "name": "CVE-2022-2602",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T19:23:44+00:00",
      "updated_at": "2022-10-20T19:23:44+00:00"
    },
    {
      "name": "CVE-2022-3077",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-15T11:27:51+00:00",
      "updated_at": "2023-02-15T11:27:51+00:00"
    },
    {
      "name": "CVE-2022-3577",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-15T11:38:56+00:00",
      "updated_at": "2023-02-15T11:38:56+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-15T11:48:39+00:00",
      "updated_at": "2023-02-15T11:48:39+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-07T11:46:31+00:00",
      "updated_at": "2023-03-07T11:46:31+00:00"
    },
    {
      "name": "CVE-2022-3115",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-07T12:09:22+00:00",
      "updated_at": "2023-03-07T12:09:22+00:00"
    },
    {
      "name": "CVE-2023-1838",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:27:17+00:00",
      "updated_at": "2023-04-21T09:27:17+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:33:07+00:00",
      "updated_at": "2023-04-21T09:33:07+00:00"
    },
    {
      "name": "CVE-2023-4387",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-13T09:51:04+00:00",
      "updated_at": "2023-09-13T09:51:04+00:00"
    },
    {
      "name": "CVE-2023-4459",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-13T10:29:10+00:00",
      "updated_at": "2023-09-13T10:29:10+00:00"
    },
    {
      "name": "CVE-2023-4385",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-13T10:59:49+00:00",
      "updated_at": "2023-09-13T10:59:49+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-08-05T13:35:10+00:00",
  "updated_at": "2022-08-10T03:14:38+00:00",
  "deleted_at": null
}