Zercurity data services
  • Summary
  • Applications (7)
  • Packages (0)
  • Vulnerabilities (9)

linux-oem-tools-4.13.0-1009

Hashes
Linux kernel version specific tools for version 4.13.0-1009 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.13.0-1009 on 64 bit x86. You probably want to install linux-tools-4.13.0-1009-<flavour>.
  • SHA256: 279a902e69501e6e68f3a1b632ae2f63fa5cfcc88928dcbb90db1517f0559a98
  • SHA1: 1a262d0cd23218f9e13307a6fa0b746fe41a5c16
  • MD5: 54e7d0d3998bf8f8ed13dde35c346d54
Information
  • Version: 4.13.0-1009.10
  • Filename: linux-oem-tools-4.13.0-1009_4.13.0-1009.10_amd64.deb
  • Size: 4036
  • Type: DEB
  • Source: linux-oem
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils (>= 2.26.1), binutils (<< 2.27), libaudit1 (>= 1:2.2.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1, libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.4.13.0-1009
/usr/lib/libcpupower.so.4.13.0-1009
227040
perf
/usr/lib/linux-oem-tools-4.13.0-1009/perf
37249280
x86_energy_perf_policy
/usr/lib/linux-oem-tools-4.13.0-1009/x86_energy_perf_policy
316080
cpupower
/usr/lib/linux-oem-tools-4.13.0-1009/cpupower
720880
usbip
/usr/lib/linux-oem-tools-4.13.0-1009/usbip
681520
turbostat
/usr/lib/linux-oem-tools-4.13.0-1009/turbostat
1060080
usbipd
/usr/lib/linux-oem-tools-4.13.0-1009/usbipd
561120

Vulnerabilities

NameRiskSourceFixed
CVE-2017-1530655USN
CVE-2017-100040570USN
CVE-2017-1219355USN
CVE-2017-1595178USN
CVE-2017-1512855USN
CVE-2017-1693978USN
USN-3507-2
CVE-2017-1664372USN
USN-3754-1
CVE-2017-1529955USN
USN-3798-2
CVE-2017-1653572USN
USN-3754-1

Raw Object

{
  "sha256": "279a902e69501e6e68f3a1b632ae2f63fa5cfcc88928dcbb90db1517f0559a98",
  "sha1": "1a262d0cd23218f9e13307a6fa0b746fe41a5c16",
  "md5": "54e7d0d3998bf8f8ed13dde35c346d54",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-tools-4.13.0-1009",
  "filename": "linux-oem-tools-4.13.0-1009_4.13.0-1009.10_amd64.deb",
  "size": 4036,
  "description": "Linux kernel version specific tools for version 4.13.0-1009\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.13.0-1009 on\n64 bit x86.\nYou probably want to install linux-tools-4.13.0-1009-<flavour>.",
  "url": null,
  "version": "4.13.0-1009.10",
  "source": "linux-oem",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils (>= 2.26.1), binutils (<< 2.27), libaudit1 (>= 1:2.2.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1, libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.4.13.0-1009",
      "sha256": "8101674377af074296d7cc2011fb77f3855911ea3806e3a58b28bd38804b0618",
      "sha1": "8f27eace29274fe4e28d3fba06f4622a2496ce40",
      "md5": "df760fecf583de724761859ff88e4b58",
      "name": "libcpupower.so.4.13.0-1009",
      "size": 22704,
      "description": null,
      "package": 939825,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T23:57:47+00:00",
      "updated_at": "2021-03-06T23:57:47+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1009/perf",
      "sha256": "76968d890b49054d11ca919e98664d524b0a7bcabf7fd6624a94e60dd8c133f4",
      "sha1": "6b39827b8a6700e6a65ed6d07de0aa61b9a90aee",
      "md5": "b1f683ddadbbf6fb4cafb67020d7746c",
      "name": "perf",
      "size": 3724928,
      "description": null,
      "package": 939825,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T23:57:47+00:00",
      "updated_at": "2021-03-06T23:57:47+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1009/x86_energy_perf_policy",
      "sha256": "604bfcd921ee84b74cd4ecf64c2c65e50920e2de7a89f9ccd595997e21424f82",
      "sha1": "f968ce2127d7c2afb00be35958d714534041fc3a",
      "md5": "cfcef032663227d1ed14a03dd21450f5",
      "name": "x86_energy_perf_policy",
      "size": 31608,
      "description": null,
      "package": 939825,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T23:57:47+00:00",
      "updated_at": "2021-03-06T23:57:47+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1009/cpupower",
      "sha256": "b846e11025325215fb75b546bb56786cd52963eb9812df1ec51c3a506533385e",
      "sha1": "de77d7479aa00f9f1f208630a6b959155793c585",
      "md5": "862e280070fb6c2946178a902e015fc6",
      "name": "cpupower",
      "size": 72088,
      "description": null,
      "package": 939825,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T23:57:47+00:00",
      "updated_at": "2021-03-06T23:57:47+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1009/usbip",
      "sha256": "bc2928ca0ac07564dd5dd0122793a533b2058c5d214c54742e9f1df71257ef25",
      "sha1": "7566fa5bcb37c198bd2de8f0b8377f07cbce90b1",
      "md5": "1e011f0f5b10bbe71e3b00dce90cf823",
      "name": "usbip",
      "size": 68152,
      "description": null,
      "package": 939825,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T23:57:47+00:00",
      "updated_at": "2021-03-06T23:57:47+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1009/turbostat",
      "sha256": "41c624df17b324cf04f3f0bb53b8e594db7b08305fc3d58c0ef54acc2dd430b3",
      "sha1": "adfe8803c6687a10998d16104cf130edb9325359",
      "md5": "9046358a8ebbcb77658ef16c2731d4b0",
      "name": "turbostat",
      "size": 106008,
      "description": null,
      "package": 939825,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T23:57:47+00:00",
      "updated_at": "2021-03-06T23:57:47+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-tools-4.13.0-1009/usbipd",
      "sha256": "52d2451196418260e5681b378c342306637486189a7d9627cc971d4368bde6d0",
      "sha1": "beab7d7718c500326ed3a4afe4a4c720f26216f7",
      "md5": "239fde0c921c069666bb46a46a62bc47",
      "name": "usbipd",
      "size": 56112,
      "description": null,
      "package": 939825,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T23:57:47+00:00",
      "updated_at": "2021-03-06T23:57:47+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2017-15306",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T11:05:21+00:00",
      "updated_at": "2021-03-10T11:05:21+00:00"
    },
    {
      "name": "CVE-2017-1000405",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T12:38:33+00:00",
      "updated_at": "2021-03-10T12:38:33+00:00"
    },
    {
      "name": "CVE-2017-12193",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T13:33:26+00:00",
      "updated_at": "2021-03-10T13:33:26+00:00"
    },
    {
      "name": "CVE-2017-15951",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-10T19:21:18+00:00",
      "updated_at": "2021-03-10T19:21:18+00:00"
    },
    {
      "name": "CVE-2017-15128",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-21T21:21:00+00:00",
      "updated_at": "2021-03-21T21:21:00+00:00"
    },
    {
      "name": "CVE-2017-16939",
      "risk": 78,
      "source": "USN",
      "sid": "USN-3507-2",
      "fixed": null,
      "created_at": "2021-03-22T06:54:10+00:00",
      "updated_at": "2021-03-22T06:54:10+00:00"
    },
    {
      "name": "CVE-2017-16643",
      "risk": 72,
      "source": "USN",
      "sid": "USN-3754-1",
      "fixed": null,
      "created_at": "2021-03-22T08:27:21+00:00",
      "updated_at": "2021-03-22T08:27:21+00:00"
    },
    {
      "name": "CVE-2017-15299",
      "risk": 55,
      "source": "USN",
      "sid": "USN-3798-2",
      "fixed": null,
      "created_at": "2021-03-22T12:08:34+00:00",
      "updated_at": "2021-03-22T12:08:34+00:00"
    },
    {
      "name": "CVE-2017-16535",
      "risk": 72,
      "source": "USN",
      "sid": "USN-3754-1",
      "fixed": null,
      "created_at": "2021-03-22T15:56:56+00:00",
      "updated_at": "2021-03-22T15:56:56+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2018-05-21T19:39:16+00:00",
  "updated_at": "2021-03-06T23:57:47+00:00",
  "deleted_at": null
}