26090f7d5ebbd5b0209a721d518a4bc0f11f10f68fdd39b96baedd83580c902b
3033a837b7e4b3cbf1afbfb0b55612c5edfe5be2
6cc090d84f5df51e6c5bed58c0b12ad4
5.15.0-1016.21
linux-gcp-tools-5.15.0-1016_5.15.0-1016.21_amd64.deb
24852
DEB
linux-gcp
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.15.0-1016 /usr/lib/libcpupower.so.5.15.0-1016 | 81784 | 0 | ||
usbip /usr/lib/linux-gcp-tools-5.15.0-1016/usbip | 248936 | 0 | ||
turbostat /usr/lib/linux-gcp-tools-5.15.0-1016/turbostat | 143536 | 0 | ||
cpupower /usr/lib/linux-gcp-tools-5.15.0-1016/cpupower | 294416 | 0 | ||
perf /usr/lib/linux-gcp-tools-5.15.0-1016/perf | 22349208 | 0 | ||
bpftool /usr/lib/linux-gcp-tools-5.15.0-1016/bpftool | 1592896 | 0 | ||
usbipd /usr/lib/linux-gcp-tools-5.15.0-1016/usbipd | 249336 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gcp-tools-5.15.0-1016/x86_energy_perf_policy | 46608 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33061 | 55 | USN | |
CVE-2022-1973 | 71 | USN | |
CVE-2022-1012 | 91 | USN | |
CVE-2022-1852 | 0 | USN | |
CVE-2022-1729 | 70 | USN | |
CVE-2022-2503 | 67 | USN | |
CVE-2022-1943 | 0 | USN | |
CVE-2022-2873 | 55 | USN | |
CVE-2022-2959 | 70 | USN | |
CVE-2022-42720 | 78 | USN | |
CVE-2022-42719 | 88 | USN | |
CVE-2022-42721 | 55 | USN | |
CVE-2022-41674 | 81 | USN | |
CVE-2022-42722 | 55 | USN | |
CVE-2022-2602 | 0 | USN | |
CVE-2022-3077 | 55 | USN | |
CVE-2022-3577 | 78 | USN | |
CVE-2022-32296 | 0 | USN | |
CVE-2022-20572 | 7 | USN | |
CVE-2022-3115 | 6 | USN | |
CVE-2023-1838 | 7 | USN | |
CVE-2022-1974 | 41 | USN | |
CVE-2023-4387 | 7 | USN | |
CVE-2023-4459 | 6 | USN | |
CVE-2023-4385 | 6 | USN |
{ "sha256": "26090f7d5ebbd5b0209a721d518a4bc0f11f10f68fdd39b96baedd83580c902b", "sha1": "3033a837b7e4b3cbf1afbfb0b55612c5edfe5be2", "md5": "6cc090d84f5df51e6c5bed58c0b12ad4", "type": "DEB", "arch": "AMD64", "name": "linux-gcp-tools-5.15.0-1016", "filename": "linux-gcp-tools-5.15.0-1016_5.15.0-1016.21_amd64.deb", "size": 24852, "description": "Linux kernel version specific tools for version 5.15.0-1016\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1016 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1016-<flavour>.", "url": null, "version": "5.15.0-1016.21", "source": "linux-gcp", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.15.0-1016", "sha256": "fd82e40f977bad263021ff281e525abeb4e695ebd7e17cc907d5ba136a2ee09c", "sha1": "43332e303c4e8791b9dddb9e3a40aea25bf635e8", "md5": "c5d6f1fcb9eda2f5214e476a0a39fa43", "name": "libcpupower.so.5.15.0-1016", "size": 81784, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:38+00:00", "updated_at": "2022-08-10T04:14:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/usbip", "sha256": "87bc10464f8ce5ec4a4262ab4ee72dbfd45b3778d40957b2732a24adc91ff426", "sha1": "4ff52ec947e3f30a439c4fd2b4c3383fae00f402", "md5": "baf456689c4a27c186e82d83ab857510", "name": "usbip", "size": 248936, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:38+00:00", "updated_at": "2022-08-10T04:14:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/turbostat", "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206", "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b", "md5": "74e235bf371ac5db13aeeacee0cc7acd", "name": "turbostat", "size": 143536, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:38+00:00", "updated_at": "2022-08-10T04:14:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/cpupower", "sha256": "5e283a74293bd056fd13e34d9756973b0660410a89240f81bb1d9692b831a542", "sha1": "764ce0f80a45039a6109192a2b7a07d6657f7ebd", "md5": "e2cec1738cc9852857713a92f0582e1f", "name": "cpupower", "size": 294416, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:38+00:00", "updated_at": "2022-08-10T04:14:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/perf", "sha256": "22f59e76a9a864b0a85c5ec8dc68d16e06bc6699b94ec0c55827df86d6ae7ce0", "sha1": "b268f7af384c3751c217735fe7d4fb72020fec61", "md5": "628adcdd2677effb3d8e99199f3edd33", "name": "perf", "size": 22349208, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:38+00:00", "updated_at": "2022-08-10T04:14:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/bpftool", "sha256": "5b2466d7ea7e061d59dc88043809497b097b811e3f2acdfc78b11e0a59ef4130", "sha1": "855d86ea26cd802305fd1bbcc81ac88a11c338fc", "md5": "28d3313e0d779b22bd0b8bd790b55815", "name": "bpftool", "size": 1592896, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:39+00:00", "updated_at": "2022-08-10T04:14:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/usbipd", "sha256": "a10af808c40e6418ee59951b3405acbd8f3a9942a15c971cf908991aa37f777f", "sha1": "c83ae6936936e3d9a1a624eaa32ec2aba71288e1", "md5": "fdce39747acc0d6042aab5e2505818e8", "name": "usbipd", "size": 249336, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:39+00:00", "updated_at": "2022-08-10T04:14:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1016/x86_energy_perf_policy", "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543", "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b", "md5": "b22454323232ae918c7ea0cc55df6557", "name": "x86_energy_perf_policy", "size": 46608, "description": null, "package": 3904719, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:14:39+00:00", "updated_at": "2022-08-10T04:14:39+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:17:19+00:00", "updated_at": "2022-09-16T16:17:19+00:00" }, { "name": "CVE-2022-1973", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:07+00:00", "updated_at": "2022-09-16T16:55:07+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:16+00:00", "updated_at": "2022-09-16T16:55:16+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:25+00:00", "updated_at": "2022-09-16T16:55:25+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:02+00:00", "updated_at": "2022-09-16T17:07:02+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:33+00:00", "updated_at": "2022-09-16T17:07:33+00:00" }, { "name": "CVE-2022-1943", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:11:16+00:00", "updated_at": "2022-09-16T17:11:16+00:00" }, { "name": "CVE-2022-2873", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:12:51+00:00", "updated_at": "2022-09-16T17:12:51+00:00" }, { "name": "CVE-2022-2959", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:13:03+00:00", "updated_at": "2022-09-16T17:13:03+00:00" }, { "name": "CVE-2022-42720", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T17:14:56+00:00", "updated_at": "2022-10-20T17:14:56+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T17:25:07+00:00", "updated_at": "2022-10-20T17:25:07+00:00" }, { "name": "CVE-2022-42721", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T18:10:44+00:00", "updated_at": "2022-10-20T18:10:44+00:00" }, { "name": "CVE-2022-41674", "risk": 81, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T18:33:21+00:00", "updated_at": "2022-10-20T18:33:21+00:00" }, { "name": "CVE-2022-42722", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T18:46:24+00:00", "updated_at": "2022-10-20T18:46:24+00:00" }, { "name": "CVE-2022-2602", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T19:23:44+00:00", "updated_at": "2022-10-20T19:23:44+00:00" }, { "name": "CVE-2022-3077", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:27:51+00:00", "updated_at": "2023-02-15T11:27:51+00:00" }, { "name": "CVE-2022-3577", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:38:56+00:00", "updated_at": "2023-02-15T11:38:56+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:48:39+00:00", "updated_at": "2023-02-15T11:48:39+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T11:46:31+00:00", "updated_at": "2023-03-07T11:46:31+00:00" }, { "name": "CVE-2022-3115", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T12:09:22+00:00", "updated_at": "2023-03-07T12:09:22+00:00" }, { "name": "CVE-2023-1838", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:27:17+00:00", "updated_at": "2023-04-21T09:27:17+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:33:07+00:00", "updated_at": "2023-04-21T09:33:07+00:00" }, { "name": "CVE-2023-4387", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T09:51:04+00:00", "updated_at": "2023-09-13T09:51:04+00:00" }, { "name": "CVE-2023-4459", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:29:10+00:00", "updated_at": "2023-09-13T10:29:10+00:00" }, { "name": "CVE-2023-4385", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:59:49+00:00", "updated_at": "2023-09-13T10:59:49+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-08-05T13:35:10+00:00", "updated_at": "2022-08-10T03:14:38+00:00", "deleted_at": null }