44f41927b64b6887c6a1ca2a57fde4588cbae7ad8e2adfc508d79f666bff9f85
8ec336ec28f44b364a7e7b1f64d436415f9bda7f
ea11b131fde30d4765ad67bb68fe1019
5.15.0-1015.20
linux-gcp-tools-5.15.0-1015_5.15.0-1015.20_amd64.deb
24852
DEB
linux-gcp
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.15.0-1015 /usr/lib/libcpupower.so.5.15.0-1015 | 81784 | 0 | ||
usbip /usr/lib/linux-gcp-tools-5.15.0-1015/usbip | 248936 | 0 | ||
turbostat /usr/lib/linux-gcp-tools-5.15.0-1015/turbostat | 143536 | 0 | ||
cpupower /usr/lib/linux-gcp-tools-5.15.0-1015/cpupower | 294416 | 0 | ||
perf /usr/lib/linux-gcp-tools-5.15.0-1015/perf | 22349200 | 0 | ||
bpftool /usr/lib/linux-gcp-tools-5.15.0-1015/bpftool | 1592896 | 0 | ||
usbipd /usr/lib/linux-gcp-tools-5.15.0-1015/usbipd | 249336 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gcp-tools-5.15.0-1015/x86_energy_perf_policy | 46608 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33061 | 55 | USN | |
CVE-2022-2588 | 0 | USN | |
CVE-2022-1973 | 71 | USN | |
CVE-2022-1012 | 91 | USN | |
CVE-2022-1852 | 0 | USN | |
CVE-2022-2586 | 0 | USN | |
CVE-2022-34918 | 0 | USN | |
CVE-2022-1729 | 70 | USN | |
CVE-2022-28893 | 78 | USN | |
CVE-2022-2503 | 67 | USN | |
CVE-2022-1943 | 0 | USN | |
CVE-2022-2873 | 55 | USN | |
CVE-2022-2959 | 70 | USN | |
CVE-2022-1652 | 78 | USN | |
CVE-2022-1679 | 0 | USN | |
CVE-2022-29901 | 0 | USN | |
CVE-2022-2585 | 0 | USN | |
CVE-2022-29900 | 0 | USN | |
CVE-2022-3077 | 55 | USN | |
CVE-2022-3577 | 78 | USN | |
CVE-2022-32296 | 0 | USN | |
CVE-2022-20572 | 7 | USN | |
CVE-2022-3115 | 6 | USN | |
CVE-2023-1838 | 7 | USN | |
CVE-2022-1974 | 41 | USN | |
CVE-2023-4387 | 7 | USN | |
CVE-2023-4459 | 6 | USN | |
CVE-2023-4385 | 6 | USN |
{ "sha256": "44f41927b64b6887c6a1ca2a57fde4588cbae7ad8e2adfc508d79f666bff9f85", "sha1": "8ec336ec28f44b364a7e7b1f64d436415f9bda7f", "md5": "ea11b131fde30d4765ad67bb68fe1019", "type": "DEB", "arch": "AMD64", "name": "linux-gcp-tools-5.15.0-1015", "filename": "linux-gcp-tools-5.15.0-1015_5.15.0-1015.20_amd64.deb", "size": 24852, "description": "Linux kernel version specific tools for version 5.15.0-1015\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1015 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1015-<flavour>.", "url": null, "version": "5.15.0-1015.20", "source": "linux-gcp", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.15.0-1015", "sha256": "04d7c9903d66569885737934bd801bd7f4cd5aae7a043ce3861650845d8657a2", "sha1": "4784d948b4000dadbcc1cdfd04174309e88cbe57", "md5": "349ce6033c0da88bfd686f254655fec6", "name": "libcpupower.so.5.15.0-1015", "size": 81784, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:17+00:00", "updated_at": "2022-07-22T03:09:17+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1015/usbip", "sha256": "9b37fc23f2858b99b704f48bd7f6b892026e1fd93b4f8e5534c11448c5f2cfac", "sha1": "f049fcde4bf1b19094bb4a44401444911eed1870", "md5": "aa29855b9da287d5cd21544c97909690", "name": "usbip", "size": 248936, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:17+00:00", "updated_at": "2022-07-22T03:09:17+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1015/turbostat", "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206", "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b", "md5": "74e235bf371ac5db13aeeacee0cc7acd", "name": "turbostat", "size": 143536, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:17+00:00", "updated_at": "2022-07-22T03:09:17+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1015/cpupower", "sha256": "db8dd2b955005250a12fe276ec9ac01a394030ba11dd7b14ef196669cd370ba0", "sha1": "f6972a38a0a072317c9232535e13fbac57cc74a7", "md5": "aca4049bf82971a21f0f71606a012ac9", "name": "cpupower", "size": 294416, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:17+00:00", "updated_at": "2022-07-22T03:09:17+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1015/perf", "sha256": "52fe5db8bec9ef5f34c1f355fe164de64dae8c14c4c6c35ff8b64f2ca612f145", "sha1": "01271c086cd467478e6bbb8cca6cf5670d26fb17", "md5": "fa610a6ca624e8c7979e5a0924e57971", "name": "perf", "size": 22349200, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:18+00:00", "updated_at": "2022-07-22T03:09:18+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1015/bpftool", "sha256": "65389f3239b0f0e260e8fe90643cd6093ec9d3559248f5a0baaef6b3c67b8dd5", "sha1": "1d9b365136c9923023953a152b9d08363700f049", "md5": "20c54bd50461af9862f9d78fa28eb622", "name": "bpftool", "size": 1592896, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:18+00:00", "updated_at": "2022-07-22T03:09:18+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1015/usbipd", "sha256": "1232e24094eec046efcfba96d28c3e44251387cd83d065b05e254e400a57fc2a", "sha1": "902e2928d2187278de4f5cf2a7979c1f47318524", "md5": "150c277ffbeb02e51f91ea2555f2cad3", "name": "usbipd", "size": 249336, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:18+00:00", "updated_at": "2022-07-22T03:09:18+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.15.0-1015/x86_energy_perf_policy", "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543", "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b", "md5": "b22454323232ae918c7ea0cc55df6557", "name": "x86_energy_perf_policy", "size": 46608, "description": null, "package": 3858877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-22T03:09:18+00:00", "updated_at": "2022-07-22T03:09:18+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:17:19+00:00", "updated_at": "2022-09-16T16:17:19+00:00" }, { "name": "CVE-2022-2588", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:25:12+00:00", "updated_at": "2022-09-16T16:25:12+00:00" }, { "name": "CVE-2022-1973", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:07+00:00", "updated_at": "2022-09-16T16:55:07+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:16+00:00", "updated_at": "2022-09-16T16:55:16+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:25+00:00", "updated_at": "2022-09-16T16:55:25+00:00" }, { "name": "CVE-2022-2586", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:56:27+00:00", "updated_at": "2022-09-16T16:56:27+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:57:49+00:00", "updated_at": "2022-09-16T16:57:49+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:02+00:00", "updated_at": "2022-09-16T17:07:02+00:00" }, { "name": "CVE-2022-28893", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:21+00:00", "updated_at": "2022-09-16T17:07:21+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:33+00:00", "updated_at": "2022-09-16T17:07:33+00:00" }, { "name": "CVE-2022-1943", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:11:16+00:00", "updated_at": "2022-09-16T17:11:16+00:00" }, { "name": "CVE-2022-2873", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:12:51+00:00", "updated_at": "2022-09-16T17:12:51+00:00" }, { "name": "CVE-2022-2959", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:13:03+00:00", "updated_at": "2022-09-16T17:13:03+00:00" }, { "name": "CVE-2022-1652", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:14:05+00:00", "updated_at": "2022-09-16T17:14:05+00:00" }, { "name": "CVE-2022-1679", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:20:37+00:00", "updated_at": "2022-09-16T17:20:37+00:00" }, { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-18T13:37:50+00:00", "updated_at": "2022-09-18T13:37:50+00:00" }, { "name": "CVE-2022-2585", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-18T18:00:22+00:00", "updated_at": "2022-09-18T18:00:22+00:00" }, { "name": "CVE-2022-29900", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-19T11:13:45+00:00", "updated_at": "2022-09-19T11:13:45+00:00" }, { "name": "CVE-2022-3077", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:27:51+00:00", "updated_at": "2023-02-15T11:27:51+00:00" }, { "name": "CVE-2022-3577", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:38:55+00:00", "updated_at": "2023-02-15T11:38:55+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:48:38+00:00", "updated_at": "2023-02-15T11:48:38+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T11:46:31+00:00", "updated_at": "2023-03-07T11:46:31+00:00" }, { "name": "CVE-2022-3115", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T12:09:22+00:00", "updated_at": "2023-03-07T12:09:22+00:00" }, { "name": "CVE-2023-1838", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:27:16+00:00", "updated_at": "2023-04-21T09:27:16+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:33:07+00:00", "updated_at": "2023-04-21T09:33:07+00:00" }, { "name": "CVE-2023-4387", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T09:51:04+00:00", "updated_at": "2023-09-13T09:51:04+00:00" }, { "name": "CVE-2023-4459", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:29:10+00:00", "updated_at": "2023-09-13T10:29:10+00:00" }, { "name": "CVE-2023-4385", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:59:49+00:00", "updated_at": "2023-09-13T10:59:49+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-07-21T21:04:02+00:00", "updated_at": "2022-07-22T02:09:17+00:00", "deleted_at": null }