54e6f8aee509286ff513e31225cc9c5c2fe84396a6b50518accc07a4401f64c6
e63dfb5e89655ee61a6b266a53084205d2c18408
8e68f078c4ffd920271c78bacc9d48d9
5.15.0-1015.18
linux-kvm-tools-5.15.0-1015_5.15.0-1015.18_amd64.deb
24765
DEB
linux-kvm
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.15.0-1015 /usr/lib/libcpupower.so.5.15.0-1015 | 81784 | 0 | ||
usbip /usr/lib/linux-kvm-tools-5.15.0-1015/usbip | 248936 | 0 | ||
turbostat /usr/lib/linux-kvm-tools-5.15.0-1015/turbostat | 143536 | 0 | ||
cpupower /usr/lib/linux-kvm-tools-5.15.0-1015/cpupower | 294416 | 0 | ||
perf /usr/lib/linux-kvm-tools-5.15.0-1015/perf | 22349208 | 0 | ||
bpftool /usr/lib/linux-kvm-tools-5.15.0-1015/bpftool | 1592896 | 0 | ||
usbipd /usr/lib/linux-kvm-tools-5.15.0-1015/usbipd | 249336 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-kvm-tools-5.15.0-1015/x86_energy_perf_policy | 46608 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33061 | 55 | USN | |
CVE-2022-2588 | 0 | USN | |
CVE-2022-1973 | 71 | USN | |
CVE-2022-1012 | 91 | USN | |
CVE-2022-1852 | 0 | USN | |
CVE-2022-2586 | 0 | USN | |
CVE-2022-34918 | 0 | USN | |
CVE-2022-1729 | 70 | USN | |
CVE-2022-28893 | 78 | USN | |
CVE-2022-2503 | 67 | USN | |
CVE-2022-1943 | 0 | USN | |
CVE-2022-2873 | 55 | USN | |
CVE-2022-2959 | 70 | USN | |
CVE-2022-1652 | 78 | USN | |
CVE-2022-1679 | 0 | USN | |
CVE-2022-29901 | 0 | USN | |
CVE-2022-2585 | 0 | USN | |
CVE-2022-29900 | 0 | USN | |
CVE-2022-32296 | 0 | USN | |
CVE-2022-3577 | 78 | USN | |
CVE-2022-3077 | 55 | USN | |
CVE-2022-20572 | 7 | USN | |
CVE-2022-3115 | 6 | USN | |
CVE-2023-1838 | 7 | USN | |
CVE-2022-1974 | 41 | USN | |
CVE-2023-4387 | 7 | USN | |
CVE-2023-4459 | 6 | USN | |
CVE-2023-4385 | 6 | USN |
{ "sha256": "54e6f8aee509286ff513e31225cc9c5c2fe84396a6b50518accc07a4401f64c6", "sha1": "e63dfb5e89655ee61a6b266a53084205d2c18408", "md5": "8e68f078c4ffd920271c78bacc9d48d9", "type": "DEB", "arch": "AMD64", "name": "linux-kvm-tools-5.15.0-1015", "filename": "linux-kvm-tools-5.15.0-1015_5.15.0-1015.18_amd64.deb", "size": 24765, "description": "Linux kernel version specific tools for version 5.15.0-1015\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1015 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1015-<flavour>.", "url": null, "version": "5.15.0-1015.18", "source": "linux-kvm", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.15.0-1015", "sha256": "fedbd156a8eafe1232a32df43ca2e0f94c16bb38cc5cf6911eea3ec0db143796", "sha1": "dcce596fec6fbdf7079218c83f3f4c3d12a7d90e", "md5": "82e374d2f35ae972437afa63f2847934", "name": "libcpupower.so.5.15.0-1015", "size": 81784, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1015/usbip", "sha256": "e40297d55ae4ebd11354d92eb3be335125e9507b97ba80d54c16b4777e34f95b", "sha1": "131952bb05f53c99599618a8a662f4855ec72b6c", "md5": "2daafb55a509f6cda47e77a10f077ac3", "name": "usbip", "size": 248936, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1015/turbostat", "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206", "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b", "md5": "74e235bf371ac5db13aeeacee0cc7acd", "name": "turbostat", "size": 143536, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1015/cpupower", "sha256": "a93a7b5fd71426bf4efed558d7c7470dedc26e83a5b9d30a8d8b9d98d5f65460", "sha1": "e71dd8b08bb5c3d3a5434add17d4b4e627452904", "md5": "4abc01c64ad693cbee46a788d9e3244b", "name": "cpupower", "size": 294416, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1015/perf", "sha256": "2ab250a08e14ac15553944140893b4d4e07cfbf1f238c424c225e8bc50a643f0", "sha1": "1ac7e2d2612223e4cdcf3cecca5c02ee5d700c88", "md5": "4d10c81eea2d9894bc7ec1bb8f6d3fce", "name": "perf", "size": 22349208, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1015/bpftool", "sha256": "dae54c23d1c6a249acbef8b43718a703fd2f49790670a2733c1b36fc2ceef9c2", "sha1": "08b1477d38d6ae18727015b40b90e92331fa4052", "md5": "684fdffb210a218822fd781302803ad7", "name": "bpftool", "size": 1592896, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1015/usbipd", "sha256": "908622ecb7a1e876076fb3d26c1d7912857cc4487949c07eaeb5296295565fe7", "sha1": "dc8a957c01c42062a0991f52bfdbd34e17dee1db", "md5": "fdd3cd2e78f12070a0c8b937988d749f", "name": "usbipd", "size": 249336, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.15.0-1015/x86_energy_perf_policy", "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543", "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b", "md5": "b22454323232ae918c7ea0cc55df6557", "name": "x86_energy_perf_policy", "size": 46608, "description": null, "package": 3889808, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-05T03:53:36+00:00", "updated_at": "2022-08-05T03:53:36+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:14:42+00:00", "updated_at": "2022-09-16T16:14:42+00:00" }, { "name": "CVE-2022-2588", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:22:24+00:00", "updated_at": "2022-09-16T16:22:24+00:00" }, { "name": "CVE-2022-1973", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:04+00:00", "updated_at": "2022-09-16T16:55:04+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:13+00:00", "updated_at": "2022-09-16T16:55:13+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:55:22+00:00", "updated_at": "2022-09-16T16:55:22+00:00" }, { "name": "CVE-2022-2586", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:56:17+00:00", "updated_at": "2022-09-16T16:56:17+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T16:57:39+00:00", "updated_at": "2022-09-16T16:57:39+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:06:55+00:00", "updated_at": "2022-09-16T17:06:55+00:00" }, { "name": "CVE-2022-28893", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:14+00:00", "updated_at": "2022-09-16T17:07:14+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:07:30+00:00", "updated_at": "2022-09-16T17:07:30+00:00" }, { "name": "CVE-2022-1943", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:11:13+00:00", "updated_at": "2022-09-16T17:11:13+00:00" }, { "name": "CVE-2022-2873", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:12:48+00:00", "updated_at": "2022-09-16T17:12:48+00:00" }, { "name": "CVE-2022-2959", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:13:00+00:00", "updated_at": "2022-09-16T17:13:00+00:00" }, { "name": "CVE-2022-1652", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:13:56+00:00", "updated_at": "2022-09-16T17:13:56+00:00" }, { "name": "CVE-2022-1679", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-16T17:20:28+00:00", "updated_at": "2022-09-16T17:20:28+00:00" }, { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-18T13:37:45+00:00", "updated_at": "2022-09-18T13:37:45+00:00" }, { "name": "CVE-2022-2585", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-18T18:00:19+00:00", "updated_at": "2022-09-18T18:00:19+00:00" }, { "name": "CVE-2022-29900", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-19T11:13:43+00:00", "updated_at": "2022-09-19T11:13:43+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:20:52+00:00", "updated_at": "2023-02-18T11:20:52+00:00" }, { "name": "CVE-2022-3577", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:25:25+00:00", "updated_at": "2023-02-18T11:25:25+00:00" }, { "name": "CVE-2022-3077", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T12:10:37+00:00", "updated_at": "2023-02-18T12:10:37+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T11:46:25+00:00", "updated_at": "2023-03-07T11:46:25+00:00" }, { "name": "CVE-2022-3115", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T12:09:18+00:00", "updated_at": "2023-03-07T12:09:18+00:00" }, { "name": "CVE-2023-1838", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:27:14+00:00", "updated_at": "2023-04-21T09:27:14+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:33:03+00:00", "updated_at": "2023-04-21T09:33:03+00:00" }, { "name": "CVE-2023-4387", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T09:51:00+00:00", "updated_at": "2023-09-13T09:51:00+00:00" }, { "name": "CVE-2023-4459", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:29:07+00:00", "updated_at": "2023-09-13T10:29:07+00:00" }, { "name": "CVE-2023-4385", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-09-13T10:59:46+00:00", "updated_at": "2023-09-13T10:59:46+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-08-04T15:29:23+00:00", "updated_at": "2022-08-05T02:53:35+00:00", "deleted_at": null }