Zercurity data services
  • Summary
  • Applications (8)
  • Packages (0)
  • Vulnerabilities (25)

linux-kvm-tools-5.15.0-1016

Hashes
Linux kernel version specific tools for version 5.15.0-1016 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.15.0-1016 on 64 bit x86. You probably want to install linux-tools-5.15.0-1016-<flavour>.
  • SHA256: 4515536d94c7590f41f9bd22a1e192dfe19de52eed71c42e6893be08d9cbe497
  • SHA1: e44e0822a81071d21863bac7cba5743ce140e5e0
  • MD5: f3b6c042de25092b14d055c8b2329bcb
Information
  • Version: 5.15.0-1016.19
  • Filename: linux-kvm-tools-5.15.0-1016_5.15.0-1016.19_amd64.deb
  • Size: 24765
  • Type: DEB
  • Source: linux-kvm
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.15.0-1016
/usr/lib/libcpupower.so.5.15.0-1016
817840
usbip
/usr/lib/linux-kvm-tools-5.15.0-1016/usbip
2489360
turbostat
/usr/lib/linux-kvm-tools-5.15.0-1016/turbostat
1435360
cpupower
/usr/lib/linux-kvm-tools-5.15.0-1016/cpupower
2944160
perf
/usr/lib/linux-kvm-tools-5.15.0-1016/perf
223492080
bpftool
/usr/lib/linux-kvm-tools-5.15.0-1016/bpftool
15928960
usbipd
/usr/lib/linux-kvm-tools-5.15.0-1016/usbipd
2493360
x86_energy_perf_policy
/usr/lib/linux-kvm-tools-5.15.0-1016/x86_energy_perf_policy
466080

Vulnerabilities

Raw Object

{
  "sha256": "4515536d94c7590f41f9bd22a1e192dfe19de52eed71c42e6893be08d9cbe497",
  "sha1": "e44e0822a81071d21863bac7cba5743ce140e5e0",
  "md5": "f3b6c042de25092b14d055c8b2329bcb",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-kvm-tools-5.15.0-1016",
  "filename": "linux-kvm-tools-5.15.0-1016_5.15.0-1016.19_amd64.deb",
  "size": 24765,
  "description": "Linux kernel version specific tools for version 5.15.0-1016\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1016 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1016-<flavour>.",
  "url": null,
  "version": "5.15.0-1016.19",
  "source": "linux-kvm",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.15.0-1016",
      "sha256": "1b44a7c90c235a602848ca00ae86d10cd6c1d4c837be262091105a091f64f6e6",
      "sha1": "b5b74af021f8a80c47c88dde5116c89936ed511c",
      "md5": "112b26b7f5abaf2a7adf8c98b1e686a6",
      "name": "libcpupower.so.5.15.0-1016",
      "size": 81784,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/usbip",
      "sha256": "345bc3b994efce072c418db77224907ce23c2248961815a0e47b82555c9c536c",
      "sha1": "7539b9afa307b22962906ad7101cdc0fac2cca25",
      "md5": "d17ed0edb1b838d7d90ab73817ec43a7",
      "name": "usbip",
      "size": 248936,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/turbostat",
      "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206",
      "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b",
      "md5": "74e235bf371ac5db13aeeacee0cc7acd",
      "name": "turbostat",
      "size": 143536,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/cpupower",
      "sha256": "5b4c3725dab3ddbebaaf5878ff27cee5847f4588cfead069a5c6cc215cb4e93a",
      "sha1": "40ab5739287adcfe82c124bce71c01177743dd0d",
      "md5": "d8fcc7bde174a569542165be906db608",
      "name": "cpupower",
      "size": 294416,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/perf",
      "sha256": "c4fb8b6bbef84c47dead4a3ed6638a792c65776244af7837458bb7d7bc7f8a3e",
      "sha1": "ad56e4ae2b54c97ff1272dac0206b9427b016fd2",
      "md5": "1282a51b232b25d0d32fc7cde7a1666f",
      "name": "perf",
      "size": 22349208,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/bpftool",
      "sha256": "bf510a6b9e9edcecde55ebca454ed7e6171c267f922ddff49f7cc11aa5a16cf2",
      "sha1": "8eaf327da29b59e750ce3fc1fb4909ff30060517",
      "md5": "17939b5d958873ff0ec8094b7eedc2a1",
      "name": "bpftool",
      "size": 1592896,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/usbipd",
      "sha256": "670bc5a664e2442399025a27a7193ac3b2a446bc15829ce2f7ebe04d0b67aecc",
      "sha1": "f5f224e89db2b59c9f6af8ff27b94383854bda28",
      "md5": "145499ec71811369a06cc996e644e053",
      "name": "usbipd",
      "size": 249336,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-kvm-tools-5.15.0-1016/x86_energy_perf_policy",
      "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543",
      "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b",
      "md5": "b22454323232ae918c7ea0cc55df6557",
      "name": "x86_energy_perf_policy",
      "size": 46608,
      "description": null,
      "package": 3904817,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-08-10T04:18:52+00:00",
      "updated_at": "2022-08-10T04:18:52+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:14:43+00:00",
      "updated_at": "2022-09-16T16:14:43+00:00"
    },
    {
      "name": "CVE-2022-1973",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:55:05+00:00",
      "updated_at": "2022-09-16T16:55:05+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:55:14+00:00",
      "updated_at": "2022-09-16T16:55:14+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T16:55:23+00:00",
      "updated_at": "2022-09-16T16:55:23+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:06:55+00:00",
      "updated_at": "2022-09-16T17:06:55+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:07:30+00:00",
      "updated_at": "2022-09-16T17:07:30+00:00"
    },
    {
      "name": "CVE-2022-1943",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:11:13+00:00",
      "updated_at": "2022-09-16T17:11:13+00:00"
    },
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:12:48+00:00",
      "updated_at": "2022-09-16T17:12:48+00:00"
    },
    {
      "name": "CVE-2022-2959",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-09-16T17:13:00+00:00",
      "updated_at": "2022-09-16T17:13:00+00:00"
    },
    {
      "name": "CVE-2022-42720",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T17:10:47+00:00",
      "updated_at": "2022-10-20T17:10:47+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T17:25:04+00:00",
      "updated_at": "2022-10-20T17:25:04+00:00"
    },
    {
      "name": "CVE-2022-42721",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T18:10:39+00:00",
      "updated_at": "2022-10-20T18:10:39+00:00"
    },
    {
      "name": "CVE-2022-41674",
      "risk": 81,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T18:33:16+00:00",
      "updated_at": "2022-10-20T18:33:16+00:00"
    },
    {
      "name": "CVE-2022-42722",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T18:46:22+00:00",
      "updated_at": "2022-10-20T18:46:22+00:00"
    },
    {
      "name": "CVE-2022-2602",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-10-20T19:23:38+00:00",
      "updated_at": "2022-10-20T19:23:38+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:20:52+00:00",
      "updated_at": "2023-02-18T11:20:52+00:00"
    },
    {
      "name": "CVE-2022-3577",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:25:25+00:00",
      "updated_at": "2023-02-18T11:25:25+00:00"
    },
    {
      "name": "CVE-2022-3077",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T12:10:37+00:00",
      "updated_at": "2023-02-18T12:10:37+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-07T11:46:25+00:00",
      "updated_at": "2023-03-07T11:46:25+00:00"
    },
    {
      "name": "CVE-2022-3115",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-07T12:09:19+00:00",
      "updated_at": "2023-03-07T12:09:19+00:00"
    },
    {
      "name": "CVE-2023-1838",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:27:14+00:00",
      "updated_at": "2023-04-21T09:27:14+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:33:03+00:00",
      "updated_at": "2023-04-21T09:33:03+00:00"
    },
    {
      "name": "CVE-2023-4387",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-13T09:51:01+00:00",
      "updated_at": "2023-09-13T09:51:01+00:00"
    },
    {
      "name": "CVE-2023-4459",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-13T10:29:07+00:00",
      "updated_at": "2023-09-13T10:29:07+00:00"
    },
    {
      "name": "CVE-2023-4385",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-09-13T10:59:46+00:00",
      "updated_at": "2023-09-13T10:59:46+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-08-05T13:47:09+00:00",
  "updated_at": "2022-08-10T03:18:51+00:00",
  "deleted_at": null
}