Zercurity data services
  • Summary
  • Applications (8)
  • Packages (0)
  • Vulnerabilities (17)

linux-aws-tools-4.15.0-1086

Hashes
Linux kernel version specific tools for version 4.15.0-1086 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.15.0-1086 on 64 bit x86. You probably want to install linux-tools-4.15.0-1086-<flavour>.
  • SHA256: 5006f89e1653c67eef174b6a8a8cb5c9b20d651b693df5f31c6c0ed599e8736a
  • SHA1: 464fd491894a2ae506d256e3bd6888216453b73f
  • MD5: da882ebed4c458a9f72ab6cfc65ecb9e
Information
  • Version: 4.15.0-1086.91
  • Filename: linux-aws-tools-4.15.0-1086_4.15.0-1086.91_amd64.deb
  • Size: 20226
  • Type: DEB
  • Source: linux-aws
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.4.15.0-1086
/usr/lib/libcpupower.so.4.15.0-1086
794400
perf
/usr/lib/linux-aws-tools-4.15.0-1086/perf
189457200
x86_energy_perf_policy
/usr/lib/linux-aws-tools-4.15.0-1086/x86_energy_perf_policy
384080
cpupower
/usr/lib/linux-aws-tools-4.15.0-1086/cpupower
2950000
libperf-jvmti.so
/usr/lib/linux-aws-tools-4.15.0-1086/libperf-jvmti.so
2090000
usbip
/usr/lib/linux-aws-tools-4.15.0-1086/usbip
2806160
turbostat
/usr/lib/linux-aws-tools-4.15.0-1086/turbostat
1189840
usbipd
/usr/lib/linux-aws-tools-4.15.0-1086/usbipd
2142080

Vulnerabilities

NameRiskSourceFixed
CVE-2021-060549USN
CVE-2020-2809759USN
CVE-2020-2528441USN
USN-4752-1
CVE-2020-2528564USN
USN-4660-1
CVE-2020-2521160USN
USN-4660-1
CVE-2020-1439056USN
USN-4660-1
CVE-2020-2564575USN
USN-4660-1
CVE-2020-1435178USN
USN-4660-1
CVE-2020-2564155USN
USN-4752-1
CVE-2020-046572USN
CVE-2020-2891561USN
USN-4752-1
CVE-2020-2564375USN
USN-4752-1
CVE-2020-3631255USN
CVE-2021-04480USN
CVE-2021-104878USN
CVE-2021-3963478USN
CVE-2022-20565USN

Raw Object

{
  "sha256": "5006f89e1653c67eef174b6a8a8cb5c9b20d651b693df5f31c6c0ed599e8736a",
  "sha1": "464fd491894a2ae506d256e3bd6888216453b73f",
  "md5": "da882ebed4c458a9f72ab6cfc65ecb9e",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-aws-tools-4.15.0-1086",
  "filename": "linux-aws-tools-4.15.0-1086_4.15.0-1086.91_amd64.deb",
  "size": 20226,
  "description": "Linux kernel version specific tools for version 4.15.0-1086\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-1086 on\n64 bit x86.\nYou probably want to install linux-tools-4.15.0-1086-<flavour>.",
  "url": null,
  "version": "4.15.0-1086.91",
  "source": "linux-aws",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libaudit1 (>= 1:2.2.1), libbinutils (>= 2.30), libbinutils (<< 2.30.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.4.15.0-1086",
      "sha256": "c1b30486f39eba09cb5c9a38804893e0b6de96b9fa0eca2ec75934180e72fc1d",
      "sha1": "37186f7fb357a2fe1f388868391bcdec95319698",
      "md5": "986349400519eea06f6518057ee0819b",
      "name": "libcpupower.so.4.15.0-1086",
      "size": 79440,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1086/perf",
      "sha256": "47b5872abbd0200aa4a5789aa23632993635b2fc881658985fdb839f1e3f2817",
      "sha1": "f14e48883d62692aba61c3f346775c137f660a92",
      "md5": "a4b200c0ede1432c38f32919e937b8ff",
      "name": "perf",
      "size": 18945720,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1086/x86_energy_perf_policy",
      "sha256": "93075820b372dc73b3f2474aedb31d10bf289c65e621ff9874eda6d53f0eae12",
      "sha1": "59125f8118625393adce7b758634ca4cefa9d1c6",
      "md5": "abb9ffb4051096830b6f3bd5603e8d77",
      "name": "x86_energy_perf_policy",
      "size": 38408,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1086/cpupower",
      "sha256": "3638c6a957092c53ba0b5c6bafdee187f5665ba64f85cad3d4c77953816097a6",
      "sha1": "a6ceb0686a90796266a9075ef37cb98cc7e15d9d",
      "md5": "9758e3a9fd85470a101463f35ff0b21d",
      "name": "cpupower",
      "size": 295000,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1086/libperf-jvmti.so",
      "sha256": "c5358091fdf7b58f3beaaf4d78c7b762eb494330206d1f8aab570df65830ac29",
      "sha1": "968f46cc361bc46383715341520819de939a1b23",
      "md5": "69700fde8d2d34d48c813b5d903c2fcf",
      "name": "libperf-jvmti.so",
      "size": 209000,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1086/usbip",
      "sha256": "611466bd33be26cb98f1d27c1af07c6e5d3e12269ef571550343032e853101ff",
      "sha1": "c809a09862460756ddee505e8c5e5f67ca6a68fa",
      "md5": "2d59fa2a149a7a609d4daca5dfe100bf",
      "name": "usbip",
      "size": 280616,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1086/turbostat",
      "sha256": "8e82ca09d7960e0462453148ef71e3ed913f0b2ed4952538ba2a1e0aecc5035e",
      "sha1": "f2e8420b9a55c3c21e0cde156c98d491103eae4d",
      "md5": "1a434f28b841ec569acef2a9dcd6f876",
      "name": "turbostat",
      "size": 118984,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-aws-tools-4.15.0-1086/usbipd",
      "sha256": "fd412d7e7c7fe0b0e6741abeaca89d55c6739565357355183c4663c09964983e",
      "sha1": "d3b09191c914394a81eff6f951dd9f44be0986c4",
      "md5": "919913a09c2df68efa579893704b17d9",
      "name": "usbipd",
      "size": 214208,
      "description": null,
      "package": 1797150,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-19T10:40:16+00:00",
      "updated_at": "2021-03-19T10:40:16+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-0605",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-08-19T02:06:34+00:00",
      "updated_at": "2021-08-19T02:06:34+00:00"
    },
    {
      "name": "CVE-2020-28097",
      "risk": 59,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-08-19T02:15:16+00:00",
      "updated_at": "2021-08-19T02:15:16+00:00"
    },
    {
      "name": "CVE-2020-25284",
      "risk": 41,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-20T18:45:11+00:00",
      "updated_at": "2021-03-20T18:45:11+00:00"
    },
    {
      "name": "CVE-2020-25285",
      "risk": 64,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-20T18:54:13+00:00",
      "updated_at": "2021-03-20T18:54:13+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-20T19:31:51+00:00",
      "updated_at": "2021-03-20T19:31:51+00:00"
    },
    {
      "name": "CVE-2020-14390",
      "risk": 56,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T02:18:25+00:00",
      "updated_at": "2021-03-21T02:18:25+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T03:11:16+00:00",
      "updated_at": "2021-03-21T03:11:16+00:00"
    },
    {
      "name": "CVE-2020-14351",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4660-1",
      "fixed": null,
      "created_at": "2021-03-21T03:21:34+00:00",
      "updated_at": "2021-03-21T03:21:34+00:00"
    },
    {
      "name": "CVE-2020-25641",
      "risk": 55,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T03:21:45+00:00",
      "updated_at": "2021-03-21T03:21:45+00:00"
    },
    {
      "name": "CVE-2020-0465",
      "risk": 72,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-21T04:16:21+00:00",
      "updated_at": "2021-03-21T04:16:21+00:00"
    },
    {
      "name": "CVE-2020-28915",
      "risk": 61,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T07:53:54+00:00",
      "updated_at": "2021-03-21T07:53:54+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "USN",
      "sid": "USN-4752-1",
      "fixed": null,
      "created_at": "2021-03-21T12:17:31+00:00",
      "updated_at": "2021-03-21T12:17:31+00:00"
    },
    {
      "name": "CVE-2020-36312",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-06-30T21:08:51+00:00",
      "updated_at": "2021-06-30T21:08:51+00:00"
    },
    {
      "name": "CVE-2021-0448",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-07-19T17:26:29+00:00",
      "updated_at": "2021-07-19T17:26:29+00:00"
    },
    {
      "name": "CVE-2021-1048",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-01-07T03:39:30+00:00",
      "updated_at": "2022-01-07T03:39:30+00:00"
    },
    {
      "name": "CVE-2021-39634",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-01-23T05:43:47+00:00",
      "updated_at": "2022-01-23T05:43:47+00:00"
    },
    {
      "name": "CVE-2022-20565",
      "risk": null,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:25:56+00:00",
      "updated_at": "2023-04-21T09:25:56+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-10-06T15:21:27+00:00",
  "updated_at": "2021-03-19T10:40:15+00:00",
  "deleted_at": null
}