4a266867874ef8552bf2c27287cc76c7599c0dc53359f1c99fe70d0a5b961e66
2c96398034afa21bf7c15603fa1253464dfa1210
0ac04405876b81e4657c6bff06080129
5.4.0-1048.51
linux-gkeop-tools-5.4.0-1048_5.4.0-1048.51_amd64.deb
24436
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1048 /usr/lib/libcpupower.so.5.4.0-1048 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1048/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1048/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1048/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1048/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1048/perf | 21837616 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1048/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1048/bpftool | 552632 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1048/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1048/x86_energy_perf_policy | 38544 | 0 |
{ "sha256": "4a266867874ef8552bf2c27287cc76c7599c0dc53359f1c99fe70d0a5b961e66", "sha1": "2c96398034afa21bf7c15603fa1253464dfa1210", "md5": "0ac04405876b81e4657c6bff06080129", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1048", "filename": "linux-gkeop-tools-5.4.0-1048_5.4.0-1048.51_amd64.deb", "size": 24436, "description": "Linux kernel version specific tools for version 5.4.0-1048\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1048 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1048-<flavour>.", "url": null, "version": "5.4.0-1048.51", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1048", "sha256": "57fbcddcd153f6ad6ae665369a6a3fe3128519399822eaf07b38266a0d81a27a", "sha1": "5fcaaee2b9ec6df1b5fbc8005dd1a5e15e3c454d", "md5": "921ef0fc29cdf77726df7f6bc40a7fc9", "name": "libcpupower.so.5.4.0-1048", "size": 97800, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/usbip", "sha256": "ffe9a3d925fbd1038831ec0f1fb7abb77bd15d9a7748d3c9ca78a325b91f7cdc", "sha1": "9dad416f36916a9ad017afb77bae6f0db4a9b6df", "md5": "f11bd16356d8511852cf0cb7a172851e", "name": "usbip", "size": 300512, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/libperf-jvmti.so", "sha256": "9e938802cff167843a29178a1d754474bce2eff3cbb328ffa79b46b07284fe46", "sha1": "0eb4cdb9d3bfd49a6fce8dd938ebd60dfd00c457", "md5": "56cb9f42107a1399d7104c2df07065a5", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/turbostat", "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785", "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846", "md5": "3dca491f8622de5e10e9125e01b85e3e", "name": "turbostat", "size": 134424, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/cpupower", "sha256": "266f52e91af30ac74e211575dfaca730077d810fb2e87c01acc20a1852a059e5", "sha1": "b6eaee11741bb0ce7f19f937f368d3f321d3d527", "md5": "ea93b05a3354995f71bd110aea2f29b0", "name": "cpupower", "size": 337952, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/perf", "sha256": "f7731d67b3675c63d7365da600f29bf220473ffa2395ea37ede38edd6744738c", "sha1": "36676d37e2803dc6b8987950a93de8251ad33cc0", "md5": "0ab5314752965db4bfbc9bcd3a3c84ff", "name": "perf", "size": 21837616, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/acpidbg", "sha256": "89ca7ba64b815356a8f743b3c08b30d050f74a87173351aa2c277dd99a7c20f2", "sha1": "8fa58cd39772ccc7620b08086352c9dca0635bbf", "md5": "6b5362706f80f60822a2ea64f3f2dc66", "name": "acpidbg", "size": 914040, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/bpftool", "sha256": "d9b95698e709329b83a7b4247d5b3d4cddc56955a348d0a60624db8e659a975a", "sha1": "6275bd1328f819a90582bb413ad0cac0ac53380e", "md5": "9feb0f441d7504551ef3d54776da0633", "name": "bpftool", "size": 552632, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/usbipd", "sha256": "b68168a738c876a113f512ee9a0f3a26a58f54f2f3d899639bfa932e00415b73", "sha1": "13b3f5e08119107f30d495882f7fe915f2eb8b75", "md5": "11d787acef56c00d365958d54ca984fd", "name": "usbipd", "size": 297128, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1048/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3784307, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-16T03:24:02+00:00", "updated_at": "2022-06-16T03:24:02+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-1195", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:51:26+00:00", "updated_at": "2022-07-14T02:51:26+00:00" }, { "name": "CVE-2022-1199", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:52:57+00:00", "updated_at": "2022-07-14T02:52:57+00:00" }, { "name": "CVE-2022-1204", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:53:35+00:00", "updated_at": "2022-07-14T02:53:35+00:00" }, { "name": "CVE-2022-1205", "risk": 47, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:54:56+00:00", "updated_at": "2022-07-14T02:54:56+00:00" }, { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:58:35+00:00", "updated_at": "2022-07-14T02:58:35+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:59:09+00:00", "updated_at": "2022-07-14T02:59:09+00:00" }, { "name": "CVE-2022-1204", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-22T02:54:40+00:00", "updated_at": "2022-07-22T02:54:40+00:00" }, { "name": "CVE-2022-1199", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-22T03:12:25+00:00", "updated_at": "2022-07-22T03:12:25+00:00" }, { "name": "CVE-2022-1195", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-22T04:40:22+00:00", "updated_at": "2022-07-22T04:40:22+00:00" }, { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-22T05:18:11+00:00", "updated_at": "2022-07-22T05:18:11+00:00" }, { "name": "CVE-2022-1205", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-22T06:09:04+00:00", "updated_at": "2022-07-22T06:09:04+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-07-22T07:50:04+00:00", "updated_at": "2022-07-22T07:50:04+00:00" }, { "name": "CVE-2022-2588", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:03:22+00:00", "updated_at": "2022-08-11T03:03:22+00:00" }, { "name": "CVE-2022-28893", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:13:55+00:00", "updated_at": "2022-08-11T03:13:55+00:00" }, { "name": "CVE-2022-2586", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:16:08+00:00", "updated_at": "2022-08-11T03:16:08+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:17:10+00:00", "updated_at": "2022-08-11T03:17:10+00:00" }, { "name": "CVE-2022-1679", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:24:28+00:00", "updated_at": "2022-08-11T03:24:28+00:00" }, { "name": "CVE-2022-1734", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:27:05+00:00", "updated_at": "2022-08-11T03:27:05+00:00" }, { "name": "CVE-2022-1652", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:29:41+00:00", "updated_at": "2022-08-11T03:29:41+00:00" }, { "name": "CVE-2022-0494", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:31:38+00:00", "updated_at": "2022-08-11T03:31:38+00:00" }, { "name": "CVE-2022-1048", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:39:31+00:00", "updated_at": "2022-08-11T03:39:31+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:41:40+00:00", "updated_at": "2022-08-11T03:41:40+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:46:08+00:00", "updated_at": "2022-08-11T03:46:08+00:00" }, { "name": "CVE-2022-28388", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-14T02:21:41+00:00", "updated_at": "2022-08-14T02:21:41+00:00" }, { "name": "CVE-2022-28388", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "024df3c4f9b4429f3292dab6ac2f9ed85adfce734eb5e032e3a791e2191cd9ee", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1049.52", "filename": "linux-gkeop-source-5.4.0_5.4.0-1049.52_all.deb" }, "created_at": "2022-11-11T12:06:58+00:00", "updated_at": "2022-11-11T12:06:58+00:00" }, { "name": "CVE-2022-2639", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:24:59+00:00", "updated_at": "2023-02-18T11:24:59+00:00" }, { "name": "CVE-2022-41858", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:42:53+00:00", "updated_at": "2023-02-18T11:42:53+00:00" }, { "name": "CVE-2022-2991", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:38:55+00:00", "updated_at": "2023-04-21T09:38:55+00:00" }, { "name": "CVE-2023-3159", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2023-07-12T10:06:19+00:00", "updated_at": "2023-07-12T10:06:19+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-06-10T20:50:12+00:00", "updated_at": "2022-06-16T02:24:01+00:00", "deleted_at": null }