4515536d94c7590f41f9bd22a1e192dfe19de52eed71c42e6893be08d9cbe497
e44e0822a81071d21863bac7cba5743ce140e5e0
f3b6c042de25092b14d055c8b2329bcb
5.15.0-1016.19
linux-kvm-tools-5.15.0-1016_5.15.0-1016.19_amd64.deb
24765
DEB
linux-kvm
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.15.0-1016 /usr/lib/libcpupower.so.5.15.0-1016 | 81784 | 0 | ||
usbip /usr/lib/linux-kvm-tools-5.15.0-1016/usbip | 248936 | 0 | ||
turbostat /usr/lib/linux-kvm-tools-5.15.0-1016/turbostat | 143536 | 0 | ||
cpupower /usr/lib/linux-kvm-tools-5.15.0-1016/cpupower | 294416 | 0 | ||
perf /usr/lib/linux-kvm-tools-5.15.0-1016/perf | 22349208 | 0 | ||
bpftool /usr/lib/linux-kvm-tools-5.15.0-1016/bpftool | 1592896 | 0 | ||
usbipd /usr/lib/linux-kvm-tools-5.15.0-1016/usbipd | 249336 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-kvm-tools-5.15.0-1016/x86_energy_perf_policy | 46608 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33061 | 55 | USN | |
CVE-2022-1973 | 71 | USN | |
CVE-2022-1012 | 91 | USN | |
CVE-2022-1852 | 0 | USN | |
CVE-2022-1729 | 70 | USN | |
CVE-2022-2503 | 67 | USN | |
CVE-2022-1943 | 0 | USN | |
CVE-2022-2873 | 55 | USN | |
CVE-2022-2959 | 70 | USN | |
CVE-2022-42720 | 78 | USN | |
CVE-2022-42719 | 88 | USN | |
CVE-2022-42721 | 55 | USN | |
CVE-2022-41674 | 81 | USN | |
CVE-2022-42722 | 55 | USN | |
CVE-2022-2602 | 0 | USN | |
CVE-2022-32296 | 0 | USN | |
CVE-2022-3577 | 78 | USN | |
CVE-2022-3077 | 55 | USN | |
CVE-2022-20572 | 7 | USN | |
CVE-2022-3115 | 6 | USN | |
CVE-2023-1838 | 7 | USN | |
CVE-2022-1974 | 41 | USN | |
CVE-2023-4387 | 7 | USN | |
CVE-2023-4459 | 6 | USN | |
CVE-2023-4385 | 6 | USN |
{ "sha256": "4515536d94c7590f41f9bd22a1e192dfe19de52eed71c42e6893be08d9cbe497", "sha1": "e44e0822a81071d21863bac7cba5743ce140e5e0", "md5": "f3b6c042de25092b14d055c8b2329bcb", "type": "DEB", "arch": "AMD64", "name": "linux-kvm-tools-5.15.0-1016", "filename": "linux-kvm-tools-5.15.0-1016_5.15.0-1016.19_amd64.deb", "size": 24765, "description": "Linux kernel version specific tools for version 5.15.0-1016\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1016 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1016-<flavour>.", "url": null, "version": "5.15.0-1016.19", "source": "linux-kvm", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.15.0-1016", "sha256": "1b44a7c90c235a602848ca00ae86d10cd6c1d4c837be262091105a091f64f6e6", "sha1": "b5b74af021f8a80c47c88dde5116c89936ed511c", "md5": "112b26b7f5abaf2a7adf8c98b1e686a6", "name": "libcpupower.so.5.15.0-1016", "size": 81784, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/usbip", "sha256": "345bc3b994efce072c418db77224907ce23c2248961815a0e47b82555c9c536c", "sha1": "7539b9afa307b22962906ad7101cdc0fac2cca25", "md5": "d17ed0edb1b838d7d90ab73817ec43a7", "name": "usbip", "size": 248936, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/turbostat", "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206", "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b", "md5": "74e235bf371ac5db13aeeacee0cc7acd", "name": "turbostat", "size": 143536, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/cpupower", "sha256": "5b4c3725dab3ddbebaaf5878ff27cee5847f4588cfead069a5c6cc215cb4e93a", "sha1": "40ab5739287adcfe82c124bce71c01177743dd0d", "md5": "d8fcc7bde174a569542165be906db608", "name": "cpupower", "size": 294416, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/perf", "sha256": "c4fb8b6bbef84c47dead4a3ed6638a792c65776244af7837458bb7d7bc7f8a3e", "sha1": "ad56e4ae2b54c97ff1272dac0206b9427b016fd2", "md5": "1282a51b232b25d0d32fc7cde7a1666f", "name": "perf", "size": 22349208, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/bpftool", "sha256": "bf510a6b9e9edcecde55ebca454ed7e6171c267f922ddff49f7cc11aa5a16cf2", "sha1": "8eaf327da29b59e750ce3fc1fb4909ff30060517", "md5": "17939b5d958873ff0ec8094b7eedc2a1", "name": "bpftool", "size": 1592896, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/usbipd", "sha256": "670bc5a664e2442399025a27a7193ac3b2a446bc15829ce2f7ebe04d0b67aecc", "sha1": "f5f224e89db2b59c9f6af8ff27b94383854bda28", "md5": "145499ec71811369a06cc996e644e053", "name": "usbipd", "size": 249336, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/x86_energy_perf_policy", "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543", "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b", "md5": "b22454323232ae918c7ea0cc55df6557", "name": "x86_energy_perf_policy", "size": 46608, "description": null, "package": 3904817, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:18:52+00:00", "updated_at": "2022-08-10T04:18:52+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:14:43+00:00", "updated_at": "2022-09-16T16:14:43+00:00" }, { "name": "CVE-2022-1973", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:05+00:00", "updated_at": "2022-09-16T16:55:05+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:14+00:00", "updated_at": "2022-09-16T16:55:14+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:23+00:00", "updated_at": "2022-09-16T16:55:23+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:06:55+00:00", "updated_at": "2022-09-16T17:06:55+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:30+00:00", "updated_at": "2022-09-16T17:07:30+00:00" }, { "name": "CVE-2022-1943", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:11:13+00:00", "updated_at": "2022-09-16T17:11:13+00:00" }, { "name": "CVE-2022-2873", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:12:48+00:00", "updated_at": "2022-09-16T17:12:48+00:00" }, { "name": "CVE-2022-2959", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:13:00+00:00", "updated_at": "2022-09-16T17:13:00+00:00" }, { "name": "CVE-2022-42720", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T17:10:47+00:00", "updated_at": "2022-10-20T17:10:47+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T17:25:04+00:00", "updated_at": "2022-10-20T17:25:04+00:00" }, { "name": "CVE-2022-42721", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T18:10:39+00:00", "updated_at": "2022-10-20T18:10:39+00:00" }, { "name": "CVE-2022-41674", "risk": 81, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T18:33:16+00:00", "updated_at": "2022-10-20T18:33:16+00:00" }, { "name": "CVE-2022-42722", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T18:46:22+00:00", "updated_at": "2022-10-20T18:46:22+00:00" }, { "name": "CVE-2022-2602", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-10-20T19:23:38+00:00", "updated_at": "2022-10-20T19:23:38+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:20:52+00:00", "updated_at": "2023-02-18T11:20:52+00:00" }, { "name": "CVE-2022-3577", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:25:25+00:00", "updated_at": "2023-02-18T11:25:25+00:00" }, { "name": "CVE-2022-3077", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T12:10:37+00:00", "updated_at": "2023-02-18T12:10:37+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T11:46:25+00:00", "updated_at": "2023-03-07T11:46:25+00:00" }, { "name": "CVE-2022-3115", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T12:09:19+00:00", "updated_at": "2023-03-07T12:09:19+00:00" }, { "name": "CVE-2023-1838", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:27:14+00:00", "updated_at": "2023-04-21T09:27:14+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:33:03+00:00", "updated_at": "2023-04-21T09:33:03+00:00" }, { "name": "CVE-2023-4387", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T09:51:01+00:00", "updated_at": "2023-09-13T09:51:01+00:00" }, { "name": "CVE-2023-4459", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:29:07+00:00", "updated_at": "2023-09-13T10:29:07+00:00" }, { "name": "CVE-2023-4385", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:59:46+00:00", "updated_at": "2023-09-13T10:59:46+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-08-05T13:47:09+00:00", "updated_at": "2022-08-10T03:18:51+00:00", "deleted_at": null }