Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (16)

linux-gkeop-tools-5.4.0-1056

Hashes
Linux kernel version specific tools for version 5.4.0-1056 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-1056 on 64 bit x86. You probably want to install linux-tools-5.4.0-1056-<flavour>.
  • SHA256: 3725037fa3dd46a4d58877214401eadfdbdd0dfe9602225831f9a98d60e81d32
  • SHA1: feb7d9e89efc6f47e07766ce8e902080046287c3
  • MD5: 459c031c74e60ac9b9e47b0c55abecb8
Information
  • Version: 5.4.0-1056.60
  • Filename: linux-gkeop-tools-5.4.0-1056_5.4.0-1056.60_amd64.deb
  • Size: 24473
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.4.0-1056
/usr/lib/libcpupower.so.5.4.0-1056
978000
usbip
/usr/lib/linux-gkeop-tools-5.4.0-1056/usbip
3005120
libperf-jvmti.so
/usr/lib/linux-gkeop-tools-5.4.0-1056/libperf-jvmti.so
2432640
turbostat
/usr/lib/linux-gkeop-tools-5.4.0-1056/turbostat
1344240
cpupower
/usr/lib/linux-gkeop-tools-5.4.0-1056/cpupower
3379520
perf
/usr/lib/linux-gkeop-tools-5.4.0-1056/perf
218408800
acpidbg
/usr/lib/linux-gkeop-tools-5.4.0-1056/acpidbg
9140400
bpftool
/usr/lib/linux-gkeop-tools-5.4.0-1056/bpftool
5526320
usbipd
/usr/lib/linux-gkeop-tools-5.4.0-1056/usbipd
2971280
x86_energy_perf_policy
/usr/lib/linux-gkeop-tools-5.4.0-1056/x86_energy_perf_policy
385440

Vulnerabilities

NameRiskSourceFixed
CVE-2022-299010USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-215355USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4076855USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4122247USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-297878USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36258USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-2042270USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4270355USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36357USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-3918847USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4271988USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-302870USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36333USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36293USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2023-10956USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2023-25137USN
linux-gkeop-source-5.4.0
5.4.0-1057.61

Raw Object

{
  "sha256": "3725037fa3dd46a4d58877214401eadfdbdd0dfe9602225831f9a98d60e81d32",
  "sha1": "feb7d9e89efc6f47e07766ce8e902080046287c3",
  "md5": "459c031c74e60ac9b9e47b0c55abecb8",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gkeop-tools-5.4.0-1056",
  "filename": "linux-gkeop-tools-5.4.0-1056_5.4.0-1056.60_amd64.deb",
  "size": 24473,
  "description": "Linux kernel version specific tools for version 5.4.0-1056\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1056 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1056-<flavour>.",
  "url": null,
  "version": "5.4.0-1056.60",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-1056",
      "sha256": "29ff98a990a6e8414c7fd0484d6056ceb3bd35078be3558dcd00c505a6b3d241",
      "sha1": "b2dbd8ffbc4a17ca015f046711b260023680f0f1",
      "md5": "5268fa3e26a785bb0415dd62479fdef7",
      "name": "libcpupower.so.5.4.0-1056",
      "size": 97800,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/usbip",
      "sha256": "c2d2891cd31c7d4aae4fcb07c0ddeaf45c1806ab2b856ecfbb368987e2bd4b31",
      "sha1": "090e3e9b3a19e8315ab4208eb8f1f6b64ef2caff",
      "md5": "8fc77cf0db271a3a48cb5f48965ca701",
      "name": "usbip",
      "size": 300512,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/libperf-jvmti.so",
      "sha256": "0a2af81ab0aa586df0549615edba1b08c3da74e3bff84f07434141a0301ce75e",
      "sha1": "6f5da7bad38f7870828694e9631bdb0c2bf4c79a",
      "md5": "d2ae3cb951a9ce0fef56cc978e178bd4",
      "name": "libperf-jvmti.so",
      "size": 243264,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/turbostat",
      "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b",
      "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda",
      "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/cpupower",
      "sha256": "c2d64310e4443baad8b42a9fb2ac9b8296982269deccbbdbcbc76dbffe340a39",
      "sha1": "9fb6b0ed92724cf5edc3f509355015689d7034d7",
      "md5": "c41ad05b11946863dc69b7b97e6fc028",
      "name": "cpupower",
      "size": 337952,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/perf",
      "sha256": "8dca98904fc12bfc95f5cfbfab80490740883b2d82a902b3774a6dbc79c4d240",
      "sha1": "681df45ad6cec2adf931d44e8a852a10c18d56a0",
      "md5": "9caf609254e59efbfa9ccc303f7291d4",
      "name": "perf",
      "size": 21840880,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/acpidbg",
      "sha256": "b747f88d385cfedeb19083b2ab9bc7ae32f4a0f8da1ceed811b44ba18d9c0feb",
      "sha1": "211c10f2073e88655d74e36ccfd730cab88bcb38",
      "md5": "fc8167487e54e90c6fa1916a2dde18a0",
      "name": "acpidbg",
      "size": 914040,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/bpftool",
      "sha256": "299a5dfc28d4cc9d0f17c089d1fe98bdc832b8a5d1ec5d906f1a41c72cf18c6a",
      "sha1": "542e9cfae6e8da20fc01c3be7a9acd1d09b16b7f",
      "md5": "c091dd4096c0f0ace3f9ce98c319b863",
      "name": "bpftool",
      "size": 552632,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/usbipd",
      "sha256": "4cfd2638cd006461c9debae16a5246d82bc2219f15b8dde75e5bb06e6799721f",
      "sha1": "dac957266b5e4e5547eda47ae2f7095aa347845a",
      "md5": "e0c1bc594ed1d88f67a3b01384e98c15",
      "name": "usbipd",
      "size": 297128,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1056/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 4836114,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-10-19T17:39:08+00:00",
      "updated_at": "2022-10-19T17:39:08+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-29901",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:06:20+00:00",
      "updated_at": "2022-11-21T11:06:20+00:00"
    },
    {
      "name": "CVE-2022-2153",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:10:06+00:00",
      "updated_at": "2022-11-21T11:10:06+00:00"
    },
    {
      "name": "CVE-2022-40768",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:11:14+00:00",
      "updated_at": "2022-11-21T11:11:14+00:00"
    },
    {
      "name": "CVE-2022-41222",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:28:40+00:00",
      "updated_at": "2022-11-21T11:28:40+00:00"
    },
    {
      "name": "CVE-2022-2978",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:02+00:00",
      "updated_at": "2022-11-21T11:29:02+00:00"
    },
    {
      "name": "CVE-2022-3625",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:31+00:00",
      "updated_at": "2022-11-21T11:29:31+00:00"
    },
    {
      "name": "CVE-2022-20422",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:55+00:00",
      "updated_at": "2022-11-21T11:29:55+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:15+00:00",
      "updated_at": "2022-11-21T11:30:15+00:00"
    },
    {
      "name": "CVE-2022-3635",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:34+00:00",
      "updated_at": "2022-11-21T11:30:34+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:45+00:00",
      "updated_at": "2022-11-21T11:30:45+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:31:00+00:00",
      "updated_at": "2022-11-21T11:31:00+00:00"
    },
    {
      "name": "CVE-2022-3028",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-22T10:38:25+00:00",
      "updated_at": "2022-11-22T10:38:25+00:00"
    },
    {
      "name": "CVE-2022-3633",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:27:47+00:00",
      "updated_at": "2023-04-21T09:27:47+00:00"
    },
    {
      "name": "CVE-2022-3629",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:28:29+00:00",
      "updated_at": "2023-04-21T09:28:29+00:00"
    },
    {
      "name": "CVE-2023-1095",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:31:07+00:00",
      "updated_at": "2023-04-21T09:31:07+00:00"
    },
    {
      "name": "CVE-2023-2513",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-06-06T10:18:58+00:00",
      "updated_at": "2023-06-06T10:18:58+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-10-18T19:09:21+00:00",
  "updated_at": "2022-10-19T16:39:07+00:00",
  "deleted_at": null
}