Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (11)

linux-oem-5.14-tools-5.14.0-1048

Hashes
Linux kernel version specific tools for version 5.14.0-1048 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.14.0-1048 on 64 bit x86. You probably want to install linux-tools-5.14.0-1048-<flavour>.
  • SHA256: 26729c97851fa226dfcb05b85426915d5798f015d14ce929299ca609bc66d7d5
  • SHA1: 4e89172b5cc8af5a186faed2c311dd6390122843
  • MD5: ea9689a0e84a9a2dee08e906b77345c4
Information
  • Version: 5.14.0-1048.55
  • Filename: linux-oem-5.14-tools-5.14.0-1048_5.14.0-1048.55_amd64.deb
  • Size: 31470
  • Type: DEB
  • Source: linux-oem-5.14
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.14.0-1048
/usr/lib/libcpupower.so.5.14.0-1048
989600
usbip
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbip
3005360
libperf-jvmti.so
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/libperf-jvmti.so
2362080
turbostat
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/turbostat
1446880
cpupower
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/cpupower
3509440
perf
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/perf
275373600
acpidbg
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/acpidbg
9140480
bpftool
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/bpftool
18846720
usbipd
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbipd
2971360
x86_energy_perf_policy
/usr/lib/linux-oem-5.14-tools-5.14.0-1048/x86_energy_perf_policy
473440

Vulnerabilities

Raw Object

{
  "sha256": "26729c97851fa226dfcb05b85426915d5798f015d14ce929299ca609bc66d7d5",
  "sha1": "4e89172b5cc8af5a186faed2c311dd6390122843",
  "md5": "ea9689a0e84a9a2dee08e906b77345c4",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-5.14-tools-5.14.0-1048",
  "filename": "linux-oem-5.14-tools-5.14.0-1048_5.14.0-1048.55_amd64.deb",
  "size": 31470,
  "description": "Linux kernel version specific tools for version 5.14.0-1048\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.14.0-1048 on\n64 bit x86.\nYou probably want to install linux-tools-5.14.0-1048-<flavour>.",
  "url": null,
  "version": "5.14.0-1048.55",
  "source": "linux-oem-5.14",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.14.0-1048",
      "sha256": "ae93a9856b1494b7150157bdda98ef3b271ae217836c447b1b217e33e29c2f37",
      "sha1": "a3e8d1793064392315497af38262c1dd493d22fa",
      "md5": "14cf73c3a225e9c22a6894a960872229",
      "name": "libcpupower.so.5.14.0-1048",
      "size": 98960,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbip",
      "sha256": "4e9a67c57e7c1936df5fa07fc37744974b7a65fa6380fdeb760fdf64be535aec",
      "sha1": "f0a9b09098a65b9a7bdeb7ce7221851866c3dfe5",
      "md5": "38161327f403508e88e66bcc72440eca",
      "name": "usbip",
      "size": 300536,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/libperf-jvmti.so",
      "sha256": "edc7006cba76f40ea38bcc210547169f722a7289b34a98f605003d66b9cf91bf",
      "sha1": "24b7d08a3c4453f144a016bf97e8b537c14802c1",
      "md5": "f2f8545555f818963c058249bda2eca6",
      "name": "libperf-jvmti.so",
      "size": 236208,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/turbostat",
      "sha256": "7453db1ce6a791ea888885ff15532bcfc4cc4987c01bd6036be8871ea37d01b9",
      "sha1": "7b391986647f416f6189d1ddd088e0d4820cce85",
      "md5": "b9d93f7dedfcd4ffcd1d68652465ee4c",
      "name": "turbostat",
      "size": 144688,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/cpupower",
      "sha256": "c3f0ffc570330b4a42186287ee31e142095bd67e7c63285059a5e102732faf24",
      "sha1": "ab70d5c8fd77b48fc388f461f39e0f36ff7f08d4",
      "md5": "fec6661c411ece3f34a124fe840fee3d",
      "name": "cpupower",
      "size": 350944,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/perf",
      "sha256": "6ce38711e72f3782c5be486a1b3e231c613258542bce44a4b84350e6bc005077",
      "sha1": "e5dc63e20afb85af5fbf168a05e72e72027e3542",
      "md5": "d58c1b6eb0fc0b9929ed74a8e5935e79",
      "name": "perf",
      "size": 27537360,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/acpidbg",
      "sha256": "f5cfc00ecc00cc937f1d53679963d1bc7efe64ac5b350b1973d8f4193d3f78be",
      "sha1": "c7bd4a66ac7161dbaf5402eff0ce598da86b2fe1",
      "md5": "712f48923ae4e44592c0d232f5260560",
      "name": "acpidbg",
      "size": 914048,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/bpftool",
      "sha256": "dc83aed58bf62040c2d1bd1fda41300f9768f75a54e0d92c5808d1435f6acc82",
      "sha1": "b5026423b2e9c959bd14fe5df29c31138e3f3c2c",
      "md5": "6681bbeb7edf0260f5ba2125e22d9ea3",
      "name": "bpftool",
      "size": 1884672,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:48+00:00",
      "updated_at": "2022-08-10T03:53:48+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/usbipd",
      "sha256": "3642e380bc54fae9924d4ed4688b933177f8c5539d59c5c8e39f85d2f679b9b0",
      "sha1": "fd51f9edf3946e89828508188e2bc11e49cafc6b",
      "md5": "ad5578c76475291cbea8f886f0df0fef",
      "name": "usbipd",
      "size": 297136,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:49+00:00",
      "updated_at": "2022-08-10T03:53:49+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1048/x86_energy_perf_policy",
      "sha256": "41121c3c7d4a30bd96fc7c98d6174b8cf5f4c1f1e9c342a0320336c9eb85e33e",
      "sha1": "bd3f89068a581a39950d99359fe7b357294e3d74",
      "md5": "30594cee1fca84952911e5cf60620df2",
      "name": "x86_energy_perf_policy",
      "size": 47344,
      "description": null,
      "package": 3904246,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T03:53:49+00:00",
      "updated_at": "2022-08-10T03:53:49+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "fb8a408756bc1ae0110fdbdf70b1892674c19f992b3b629d0545661986568c53",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1049.56",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1049.56_all.deb"
      },
      "created_at": "2022-08-25T03:00:33+00:00",
      "updated_at": "2022-08-25T03:00:33+00:00"
    },
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "fb8a408756bc1ae0110fdbdf70b1892674c19f992b3b629d0545661986568c53",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1049.56",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1049.56_all.deb"
      },
      "created_at": "2022-08-25T03:00:36+00:00",
      "updated_at": "2022-08-25T03:00:36+00:00"
    },
    {
      "name": "CVE-2021-33061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-26T03:09:17+00:00",
      "updated_at": "2022-08-26T03:09:17+00:00"
    },
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-26T03:09:17+00:00",
      "updated_at": "2022-08-26T03:09:17+00:00"
    },
    {
      "name": "CVE-2022-42720",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1054.61",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb"
      },
      "created_at": "2022-10-20T17:21:40+00:00",
      "updated_at": "2022-10-20T17:21:40+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1054.61",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb"
      },
      "created_at": "2022-10-20T17:25:09+00:00",
      "updated_at": "2022-10-20T17:25:09+00:00"
    },
    {
      "name": "CVE-2022-42721",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1054.61",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb"
      },
      "created_at": "2022-10-20T18:10:49+00:00",
      "updated_at": "2022-10-20T18:10:49+00:00"
    },
    {
      "name": "CVE-2022-41674",
      "risk": 81,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1054.61",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb"
      },
      "created_at": "2022-10-20T18:33:26+00:00",
      "updated_at": "2022-10-20T18:33:26+00:00"
    },
    {
      "name": "CVE-2022-42722",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1054.61",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb"
      },
      "created_at": "2022-10-20T18:46:26+00:00",
      "updated_at": "2022-10-20T18:46:26+00:00"
    },
    {
      "name": "CVE-2022-2602",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1054.61",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb"
      },
      "created_at": "2022-10-20T19:23:49+00:00",
      "updated_at": "2022-10-20T19:23:49+00:00"
    },
    {
      "name": "CVE-2022-40768",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d4cdf7c2b17c907b886ebfa3a0fa4fddce6e931e09026a3ee0b95f7656c5305",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1054.61",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1054.61_all.deb"
      },
      "created_at": "2023-02-18T12:36:13+00:00",
      "updated_at": "2023-02-18T12:36:13+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-08-08T16:19:12+00:00",
  "updated_at": "2022-08-10T02:53:47+00:00",
  "deleted_at": null
}