26729c97851fa226dfcb05b85426915d5798f015d14ce929299ca609bc66d7d5
4e89172b5cc8af5a186faed2c311dd6390122843
ea9689a0e84a9a2dee08e906b77345c4
5.14.0-1048.55
linux-oem-5.14-tools-5.14.0-1048_5.14.0-1048.55_amd64.deb
31470
DEB
linux-oem-5.14
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.14.0-1048 /usr/lib/libcpupower.so.5.14.0-1048 | 98960 | 0 | ||
usbip /usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbip | 300536 | 0 | ||
libperf-jvmti.so /usr/lib/linux-oem-5.14-tools-5.14.0-1048/libperf-jvmti.so | 236208 | 0 | ||
turbostat /usr/lib/linux-oem-5.14-tools-5.14.0-1048/turbostat | 144688 | 0 | ||
cpupower /usr/lib/linux-oem-5.14-tools-5.14.0-1048/cpupower | 350944 | 0 | ||
perf /usr/lib/linux-oem-5.14-tools-5.14.0-1048/perf | 27537360 | 0 | ||
acpidbg /usr/lib/linux-oem-5.14-tools-5.14.0-1048/acpidbg | 914048 | 0 | ||
bpftool /usr/lib/linux-oem-5.14-tools-5.14.0-1048/bpftool | 1884672 | 0 | ||
usbipd /usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbipd | 297136 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-5.14-tools-5.14.0-1048/x86_energy_perf_policy | 47344 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33061 | 55 | USN | linux-oem-5.14-tools-host 5.14.0-1049.56 |
CVE-2021-33655 | 78 | USN | linux-oem-5.14-tools-host 5.14.0-1049.56 |
CVE-2021-33061 | 55 | USN | |
CVE-2021-33655 | 78 | USN | |
CVE-2022-42720 | 78 | USN | linux-oem-5.14-tools-host 5.14.0-1054.61 |
CVE-2022-42719 | 88 | USN | linux-oem-5.14-tools-host 5.14.0-1054.61 |
CVE-2022-42721 | 55 | USN | linux-oem-5.14-tools-host 5.14.0-1054.61 |
CVE-2022-41674 | 81 | USN | linux-oem-5.14-tools-host 5.14.0-1054.61 |
CVE-2022-42722 | 55 | USN | linux-oem-5.14-tools-host 5.14.0-1054.61 |
CVE-2022-2602 | 0 | USN | linux-oem-5.14-tools-host 5.14.0-1054.61 |
CVE-2022-40768 | 55 | USN | linux-oem-5.14-tools-host 5.14.0-1054.61 |
{ "sha256": "26729c97851fa226dfcb05b85426915d5798f015d14ce929299ca609bc66d7d5", "sha1": "4e89172b5cc8af5a186faed2c311dd6390122843", "md5": "ea9689a0e84a9a2dee08e906b77345c4", "type": "DEB", "arch": "AMD64", "name": "linux-oem-5.14-tools-5.14.0-1048", "filename": "linux-oem-5.14-tools-5.14.0-1048_5.14.0-1048.55_amd64.deb", "size": 31470, "description": "Linux kernel version specific tools for version 5.14.0-1048\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.14.0-1048 on\n64 bit x86.\nYou probably want to install linux-tools-5.14.0-1048-<flavour>.", "url": null, "version": "5.14.0-1048.55", "source": "linux-oem-5.14", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.14.0-1048", "sha256": "ae93a9856b1494b7150157bdda98ef3b271ae217836c447b1b217e33e29c2f37", "sha1": "a3e8d1793064392315497af38262c1dd493d22fa", "md5": "14cf73c3a225e9c22a6894a960872229", "name": "libcpupower.so.5.14.0-1048", "size": 98960, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbip", "sha256": "4e9a67c57e7c1936df5fa07fc37744974b7a65fa6380fdeb760fdf64be535aec", "sha1": "f0a9b09098a65b9a7bdeb7ce7221851866c3dfe5", "md5": "38161327f403508e88e66bcc72440eca", "name": "usbip", "size": 300536, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/libperf-jvmti.so", "sha256": "edc7006cba76f40ea38bcc210547169f722a7289b34a98f605003d66b9cf91bf", "sha1": "24b7d08a3c4453f144a016bf97e8b537c14802c1", "md5": "f2f8545555f818963c058249bda2eca6", "name": "libperf-jvmti.so", "size": 236208, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/turbostat", "sha256": "7453db1ce6a791ea888885ff15532bcfc4cc4987c01bd6036be8871ea37d01b9", "sha1": "7b391986647f416f6189d1ddd088e0d4820cce85", "md5": "b9d93f7dedfcd4ffcd1d68652465ee4c", "name": "turbostat", "size": 144688, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/cpupower", "sha256": "c3f0ffc570330b4a42186287ee31e142095bd67e7c63285059a5e102732faf24", "sha1": "ab70d5c8fd77b48fc388f461f39e0f36ff7f08d4", "md5": "fec6661c411ece3f34a124fe840fee3d", "name": "cpupower", "size": 350944, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/perf", "sha256": "6ce38711e72f3782c5be486a1b3e231c613258542bce44a4b84350e6bc005077", "sha1": "e5dc63e20afb85af5fbf168a05e72e72027e3542", "md5": "d58c1b6eb0fc0b9929ed74a8e5935e79", "name": "perf", "size": 27537360, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/acpidbg", "sha256": "f5cfc00ecc00cc937f1d53679963d1bc7efe64ac5b350b1973d8f4193d3f78be", "sha1": "c7bd4a66ac7161dbaf5402eff0ce598da86b2fe1", "md5": "712f48923ae4e44592c0d232f5260560", "name": "acpidbg", "size": 914048, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/bpftool", "sha256": "dc83aed58bf62040c2d1bd1fda41300f9768f75a54e0d92c5808d1435f6acc82", "sha1": "b5026423b2e9c959bd14fe5df29c31138e3f3c2c", "md5": "6681bbeb7edf0260f5ba2125e22d9ea3", "name": "bpftool", "size": 1884672, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:48+00:00", "updated_at": "2022-08-10T03:53:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbipd", "sha256": "3642e380bc54fae9924d4ed4688b933177f8c5539d59c5c8e39f85d2f679b9b0", "sha1": "fd51f9edf3946e89828508188e2bc11e49cafc6b", "md5": "ad5578c76475291cbea8f886f0df0fef", "name": "usbipd", "size": 297136, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:49+00:00", "updated_at": "2022-08-10T03:53:49+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/x86_energy_perf_policy", "sha256": "41121c3c7d4a30bd96fc7c98d6174b8cf5f4c1f1e9c342a0320336c9eb85e33e", "sha1": "bd3f89068a581a39950d99359fe7b357294e3d74", "md5": "30594cee1fca84952911e5cf60620df2", "name": "x86_energy_perf_policy", "size": 47344, "description": null, "package": 3904246, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T03:53:49+00:00", "updated_at": "2022-08-10T03:53:49+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "fb8a408756bc1ae0110fdbdf70b1892674c19f992b3b629d0545661986568c53", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1049.56", "filename": "linux-oem-5.14-tools-host_5.14.0-1049.56_all.deb" }, "created_at": "2022-08-25T03:00:33+00:00", "updated_at": "2022-08-25T03:00:33+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "fb8a408756bc1ae0110fdbdf70b1892674c19f992b3b629d0545661986568c53", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1049.56", "filename": "linux-oem-5.14-tools-host_5.14.0-1049.56_all.deb" }, "created_at": "2022-08-25T03:00:36+00:00", "updated_at": "2022-08-25T03:00:36+00:00" }, { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-26T03:09:17+00:00", "updated_at": "2022-08-26T03:09:17+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-26T03:09:17+00:00", "updated_at": "2022-08-26T03:09:17+00:00" }, { "name": "CVE-2022-42720", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1054.61", "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb" }, "created_at": "2022-10-20T17:21:40+00:00", "updated_at": "2022-10-20T17:21:40+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1054.61", "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb" }, "created_at": "2022-10-20T17:25:09+00:00", "updated_at": "2022-10-20T17:25:09+00:00" }, { "name": "CVE-2022-42721", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1054.61", "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb" }, "created_at": "2022-10-20T18:10:49+00:00", "updated_at": "2022-10-20T18:10:49+00:00" }, { "name": "CVE-2022-41674", "risk": 81, "source": "USN", "sid": null, "fixed": { "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1054.61", "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb" }, "created_at": "2022-10-20T18:33:26+00:00", "updated_at": "2022-10-20T18:33:26+00:00" }, { "name": "CVE-2022-42722", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1054.61", "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb" }, "created_at": "2022-10-20T18:46:26+00:00", "updated_at": "2022-10-20T18:46:26+00:00" }, { "name": "CVE-2022-2602", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1054.61", "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb" }, "created_at": "2022-10-20T19:23:49+00:00", "updated_at": "2022-10-20T19:23:49+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1054.61", "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb" }, "created_at": "2023-02-18T12:36:13+00:00", "updated_at": "2023-02-18T12:36:13+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-08-08T16:19:12+00:00", "updated_at": "2022-08-10T02:53:47+00:00", "deleted_at": null }