497306970230bf0f97d4fcf3f34d5216dee1812e8771542945d9ddab14c41661
d36d8da14719afa5c42322fbc6c49e54f1fc69e5
f616502883612960279de4a376e07585
5.4.0-136.153
linux-tools-5.4.0-136_5.4.0-136.153_amd64.deb
24796
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
bpftool /usr/lib/linux-tools-5.4.0-136/bpftool | 551600 | 0 | ||
usbipd /usr/lib/linux-tools-5.4.0-136/usbipd | 297104 | 0 | ||
libcpupower.so.5.4.0-136 /usr/lib/libcpupower.so.5.4.0-136 | 97792 | 0 | ||
usbip /usr/lib/linux-tools-5.4.0-136/usbip | 300488 | 0 | ||
libperf-jvmti.so /usr/lib/linux-tools-5.4.0-136/libperf-jvmti.so | 243032 | 0 | ||
turbostat /usr/lib/linux-tools-5.4.0-136/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-tools-5.4.0-136/cpupower | 337944 | 0 | ||
perf /usr/lib/linux-tools-5.4.0-136/perf | 21805552 | 0 | ||
acpidbg /usr/lib/linux-tools-5.4.0-136/acpidbg | 914016 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-tools-5.4.0-136/x86_energy_perf_policy | 38544 | 0 |
{ "sha256": "497306970230bf0f97d4fcf3f34d5216dee1812e8771542945d9ddab14c41661", "sha1": "d36d8da14719afa5c42322fbc6c49e54f1fc69e5", "md5": "f616502883612960279de4a376e07585", "type": "DEB", "arch": "AMD64", "name": "linux-tools-5.4.0-136", "filename": "linux-tools-5.4.0-136_5.4.0-136.153_amd64.deb", "size": 24796, "description": "Linux kernel version specific tools for version 5.4.0-136\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-136 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-136-<flavour>.", "url": null, "version": "5.4.0-136.153", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/linux-tools-5.4.0-136/bpftool", "sha256": "fcf7411cd3a0cc4b87ad8e94b4924a7f5a777fb863eb21e07e3b9019890e7352", "sha1": "ece7f0b04e3229f55d14ebd7697078ef7969e825", "md5": "dcf87979982e586300b66745d98e4ff4", "name": "bpftool", "size": 551600, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:24+00:00", "updated_at": "2022-12-01T10:50:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/usbipd", "sha256": "05b538af9568a605a79a5418198b6d7bce3ba2d6cb01d6c04edbd22d5dfca83f", "sha1": "e2869d7e958f77bdc4f43c87fb2cde0c52cf63ad", "md5": "f64ffabd97aeb3040ca28ad21d22efa7", "name": "usbipd", "size": 297104, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:24+00:00", "updated_at": "2022-12-01T10:50:24+00:00", "deleted_at": null }, { "path": "/usr/lib/libcpupower.so.5.4.0-136", "sha256": "8c919ebda5e0c6ba72113dfef15e6516170467d6977cc98572501a01d6805efb", "sha1": "fec6d8712b48b024ce350f925dd186d879f808a0", "md5": "247e37c0b59a40371eebc7f1e0906bf9", "name": "libcpupower.so.5.4.0-136", "size": 97792, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:15+00:00", "updated_at": "2022-12-01T10:50:15+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/usbip", "sha256": "9ab5c1ccb074357140cc74b19d5ccd748421fccdfc81599eae9e858eeca34698", "sha1": "7d4d4c500ecec1bc772eefe182cde30967ffed85", "md5": "d0ea99ba586286e90252cadc934627de", "name": "usbip", "size": 300488, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:18+00:00", "updated_at": "2022-12-01T10:50:18+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/libperf-jvmti.so", "sha256": "69bc831b8ba54138f123d59586a8a304826a73702b1012d22cc41ab57d1ff4f0", "sha1": "39227be2bd24ad37d6e31afe15ab906e2e1c6699", "md5": "d6476cfe3050d0c47b41a397c96783f3", "name": "libperf-jvmti.so", "size": 243032, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:22+00:00", "updated_at": "2022-12-01T10:50:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:22+00:00", "updated_at": "2022-12-01T10:50:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/cpupower", "sha256": "2b154ae1af79c678eeeae7bdc8b3e414e8e2c6cac125edf48922090a1c2aa119", "sha1": "5710a91a06c22d826c2f870b2ca33e9610d61910", "md5": "7132574f3978d2e8de9a6cefc7862ada", "name": "cpupower", "size": 337944, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:23+00:00", "updated_at": "2022-12-01T10:50:23+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/perf", "sha256": "58009797c07010c332da3dedde14f781ab69a1146d8e148ca0b2affbb5c5a5f5", "sha1": "90e21f16ee100cf7ce6cf6e04140ba38d38267c2", "md5": "599ac53d37b4d133b0657208979fa618", "name": "perf", "size": 21805552, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:24+00:00", "updated_at": "2022-12-01T10:50:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/acpidbg", "sha256": "ff2eb6e3bccc06e032e6f4c8a943b75ac0d79e096206e77b68c7b78f5a298024", "sha1": "19c9c6bc989aeeabddeeeda18ef3c25b440cffb0", "md5": "2d985edd1bbcbf6410ad23ea6c314a37", "name": "acpidbg", "size": 914016, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:24+00:00", "updated_at": "2022-12-01T10:50:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.4.0-136/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 4938258, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-01T10:50:24+00:00", "updated_at": "2022-12-01T10:50:24+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415", "name": "linux-source-5.4.0", "version": "5.4.0-135.152", "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb" }, "created_at": "2022-12-02T12:25:42+00:00", "updated_at": "2022-12-02T12:25:42+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415", "name": "linux-source-5.4.0", "version": "5.4.0-135.152", "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb" }, "created_at": "2022-12-02T12:41:41+00:00", "updated_at": "2022-12-02T12:41:41+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415", "name": "linux-source-5.4.0", "version": "5.4.0-135.152", "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb" }, "created_at": "2022-12-02T12:42:26+00:00", "updated_at": "2022-12-02T12:42:26+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415", "name": "linux-source-5.4.0", "version": "5.4.0-135.152", "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb" }, "created_at": "2022-12-02T12:43:15+00:00", "updated_at": "2022-12-02T12:43:15+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415", "name": "linux-source-5.4.0", "version": "5.4.0-135.152", "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb" }, "created_at": "2022-12-02T12:44:19+00:00", "updated_at": "2022-12-02T12:44:19+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415", "name": "linux-source-5.4.0", "version": "5.4.0-135.152", "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb" }, "created_at": "2022-12-02T12:45:44+00:00", "updated_at": "2022-12-02T12:45:44+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "b3de27bef254d7560ef67f5ea27b7daf50bd9016750905a12db4e93320d0c415", "name": "linux-source-5.4.0", "version": "5.4.0-135.152", "filename": "linux-source-5.4.0_5.4.0-135.152_all.deb" }, "created_at": "2022-12-02T12:46:24+00:00", "updated_at": "2022-12-02T12:46:24+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_i386.deb" }, "created_at": "2022-12-03T12:39:01+00:00", "updated_at": "2022-12-03T12:39:01+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_i386.deb" }, "created_at": "2022-12-03T12:41:42+00:00", "updated_at": "2022-12-03T12:41:42+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_i386.deb" }, "created_at": "2022-12-03T12:42:47+00:00", "updated_at": "2022-12-03T12:42:47+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_i386.deb" }, "created_at": "2022-12-03T12:43:22+00:00", "updated_at": "2022-12-03T12:43:22+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_i386.deb" }, "created_at": "2022-12-03T12:44:20+00:00", "updated_at": "2022-12-03T12:44:20+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_i386.deb" }, "created_at": "2022-12-03T12:45:02+00:00", "updated_at": "2022-12-03T12:45:02+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "bf97cd8abec5981a484b733b52800abc1aefb7861633bb1035a2963ac3733308", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_i386.deb" }, "created_at": "2022-12-03T12:45:41+00:00", "updated_at": "2022-12-03T12:45:41+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:44:37+00:00", "updated_at": "2023-01-13T10:44:37+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:52:46+00:00", "updated_at": "2023-01-13T10:52:46+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:53:11+00:00", "updated_at": "2023-01-13T10:53:11+00:00" }, { "name": "CVE-2022-3643", "risk": 10, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:55:15+00:00", "updated_at": "2023-01-13T10:55:15+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c", "name": "linux-libc-dev", "version": "5.4.0-137.154", "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb" }, "created_at": "2023-01-14T10:24:56+00:00", "updated_at": "2023-01-14T10:24:56+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c", "name": "linux-libc-dev", "version": "5.4.0-137.154", "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb" }, "created_at": "2023-01-14T10:26:03+00:00", "updated_at": "2023-01-14T10:26:03+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c", "name": "linux-libc-dev", "version": "5.4.0-137.154", "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb" }, "created_at": "2023-01-14T10:26:19+00:00", "updated_at": "2023-01-14T10:26:19+00:00" }, { "name": "CVE-2022-3643", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "d72bbc2042d16488896bce6e9684d0da29eae23b81dc5a6e90985cbaa669173c", "name": "linux-libc-dev", "version": "5.4.0-137.154", "filename": "linux-libc-dev_5.4.0-137.154_amd64.deb" }, "created_at": "2023-01-14T10:26:40+00:00", "updated_at": "2023-01-14T10:26:40+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb" }, "created_at": "2023-01-21T10:58:48+00:00", "updated_at": "2023-01-21T10:58:48+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb" }, "created_at": "2023-01-26T20:04:17+00:00", "updated_at": "2023-01-26T20:04:17+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb" }, "created_at": "2023-01-27T03:22:47+00:00", "updated_at": "2023-01-27T03:22:47+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb" }, "created_at": "2023-01-27T03:41:20+00:00", "updated_at": "2023-01-27T03:41:20+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb" }, "created_at": "2023-01-27T05:31:24+00:00", "updated_at": "2023-01-27T05:31:24+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb" }, "created_at": "2023-01-27T17:45:44+00:00", "updated_at": "2023-01-27T17:45:44+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "b6c6b53f56ca8dc4401ee707c9188a04a882f6d0d2ee80c2f205748c13034fe8", "name": "linux-libc-dev", "version": "5.4.0-135.152", "filename": "linux-libc-dev_5.4.0-135.152_amd64.deb" }, "created_at": "2023-01-27T18:45:43+00:00", "updated_at": "2023-01-27T18:45:43+00:00" } ], "risk": 100, "vulnerable": 100, "outdated": 100, "malicious": 0, "created_at": "2022-11-24T18:14:11+00:00", "updated_at": "2022-12-01T10:50:08+00:00", "deleted_at": null }