3725037fa3dd46a4d58877214401eadfdbdd0dfe9602225831f9a98d60e81d32
feb7d9e89efc6f47e07766ce8e902080046287c3
459c031c74e60ac9b9e47b0c55abecb8
5.4.0-1056.60
linux-gkeop-tools-5.4.0-1056_5.4.0-1056.60_amd64.deb
24473
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1056 /usr/lib/libcpupower.so.5.4.0-1056 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1056/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1056/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1056/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1056/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1056/perf | 21840880 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1056/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1056/bpftool | 552632 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1056/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1056/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-29901 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-2153 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-40768 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-41222 | 47 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-2978 | 78 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3625 | 8 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-20422 | 70 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-42703 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3635 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-39188 | 47 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-42719 | 88 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3028 | 70 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3633 | 3 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3629 | 3 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2023-1095 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2023-2513 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
{ "sha256": "3725037fa3dd46a4d58877214401eadfdbdd0dfe9602225831f9a98d60e81d32", "sha1": "feb7d9e89efc6f47e07766ce8e902080046287c3", "md5": "459c031c74e60ac9b9e47b0c55abecb8", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1056", "filename": "linux-gkeop-tools-5.4.0-1056_5.4.0-1056.60_amd64.deb", "size": 24473, "description": "Linux kernel version specific tools for version 5.4.0-1056\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1056 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1056-<flavour>.", "url": null, "version": "5.4.0-1056.60", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1056", "sha256": "29ff98a990a6e8414c7fd0484d6056ceb3bd35078be3558dcd00c505a6b3d241", "sha1": "b2dbd8ffbc4a17ca015f046711b260023680f0f1", "md5": "5268fa3e26a785bb0415dd62479fdef7", "name": "libcpupower.so.5.4.0-1056", "size": 97800, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/usbip", "sha256": "c2d2891cd31c7d4aae4fcb07c0ddeaf45c1806ab2b856ecfbb368987e2bd4b31", "sha1": "090e3e9b3a19e8315ab4208eb8f1f6b64ef2caff", "md5": "8fc77cf0db271a3a48cb5f48965ca701", "name": "usbip", "size": 300512, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/libperf-jvmti.so", "sha256": "0a2af81ab0aa586df0549615edba1b08c3da74e3bff84f07434141a0301ce75e", "sha1": "6f5da7bad38f7870828694e9631bdb0c2bf4c79a", "md5": "d2ae3cb951a9ce0fef56cc978e178bd4", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/cpupower", "sha256": "c2d64310e4443baad8b42a9fb2ac9b8296982269deccbbdbcbc76dbffe340a39", "sha1": "9fb6b0ed92724cf5edc3f509355015689d7034d7", "md5": "c41ad05b11946863dc69b7b97e6fc028", "name": "cpupower", "size": 337952, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/perf", "sha256": "8dca98904fc12bfc95f5cfbfab80490740883b2d82a902b3774a6dbc79c4d240", "sha1": "681df45ad6cec2adf931d44e8a852a10c18d56a0", "md5": "9caf609254e59efbfa9ccc303f7291d4", "name": "perf", "size": 21840880, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/acpidbg", "sha256": "b747f88d385cfedeb19083b2ab9bc7ae32f4a0f8da1ceed811b44ba18d9c0feb", "sha1": "211c10f2073e88655d74e36ccfd730cab88bcb38", "md5": "fc8167487e54e90c6fa1916a2dde18a0", "name": "acpidbg", "size": 914040, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/bpftool", "sha256": "299a5dfc28d4cc9d0f17c089d1fe98bdc832b8a5d1ec5d906f1a41c72cf18c6a", "sha1": "542e9cfae6e8da20fc01c3be7a9acd1d09b16b7f", "md5": "c091dd4096c0f0ace3f9ce98c319b863", "name": "bpftool", "size": 552632, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/usbipd", "sha256": "4cfd2638cd006461c9debae16a5246d82bc2219f15b8dde75e5bb06e6799721f", "sha1": "dac957266b5e4e5547eda47ae2f7095aa347845a", "md5": "e0c1bc594ed1d88f67a3b01384e98c15", "name": "usbipd", "size": 297128, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 4836114, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-19T17:39:08+00:00", "updated_at": "2022-10-19T17:39:08+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:06:20+00:00", "updated_at": "2022-11-21T11:06:20+00:00" }, { "name": "CVE-2022-2153", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:10:06+00:00", "updated_at": "2022-11-21T11:10:06+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:11:14+00:00", "updated_at": "2022-11-21T11:11:14+00:00" }, { "name": "CVE-2022-41222", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:28:40+00:00", "updated_at": "2022-11-21T11:28:40+00:00" }, { "name": "CVE-2022-2978", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:02+00:00", "updated_at": "2022-11-21T11:29:02+00:00" }, { "name": "CVE-2022-3625", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:31+00:00", "updated_at": "2022-11-21T11:29:31+00:00" }, { "name": "CVE-2022-20422", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:55+00:00", "updated_at": "2022-11-21T11:29:55+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:15+00:00", "updated_at": "2022-11-21T11:30:15+00:00" }, { "name": "CVE-2022-3635", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:34+00:00", "updated_at": "2022-11-21T11:30:34+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:45+00:00", "updated_at": "2022-11-21T11:30:45+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:31:00+00:00", "updated_at": "2022-11-21T11:31:00+00:00" }, { "name": "CVE-2022-3028", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-22T10:38:25+00:00", "updated_at": "2022-11-22T10:38:25+00:00" }, { "name": "CVE-2022-3633", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:27:47+00:00", "updated_at": "2023-04-21T09:27:47+00:00" }, { "name": "CVE-2022-3629", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:28:29+00:00", "updated_at": "2023-04-21T09:28:29+00:00" }, { "name": "CVE-2023-1095", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:31:07+00:00", "updated_at": "2023-04-21T09:31:07+00:00" }, { "name": "CVE-2023-2513", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-06-06T10:18:58+00:00", "updated_at": "2023-06-06T10:18:58+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-10-18T19:09:21+00:00", "updated_at": "2022-10-19T16:39:07+00:00", "deleted_at": null }