57c8e03ee32bda106c6b5e33c530b72a3689e0e17dc0fb212b4d6fedda5ff7d8
42e1835dfda275ae93e1e92e2e325b18771e9f8a
714d46e3261c7cdcfe67a6ecdf78565f
5.4.0-1054.57
linux-gkeop-tools-5.4.0-1054_5.4.0-1054.57_amd64.deb
24472
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1054 /usr/lib/libcpupower.so.5.4.0-1054 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1054/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1054/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1054/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1054/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1054/perf | 21840880 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1054/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1054/bpftool | 552632 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1054/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1054/x86_energy_perf_policy | 38544 | 0 |
{ "sha256": "57c8e03ee32bda106c6b5e33c530b72a3689e0e17dc0fb212b4d6fedda5ff7d8", "sha1": "42e1835dfda275ae93e1e92e2e325b18771e9f8a", "md5": "714d46e3261c7cdcfe67a6ecdf78565f", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1054", "filename": "linux-gkeop-tools-5.4.0-1054_5.4.0-1054.57_amd64.deb", "size": 24472, "description": "Linux kernel version specific tools for version 5.4.0-1054\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1054 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1054-<flavour>.", "url": null, "version": "5.4.0-1054.57", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1054", "sha256": "49999ce3ac66c5902675de83b6d532b00f3b2de99832a280c3d887d2beb5ef1a", "sha1": "d2b99be32729b5ffd0befe170946686043e133fd", "md5": "93b1a4c5a4994c362f6f75f692c62d67", "name": "libcpupower.so.5.4.0-1054", "size": 97800, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:01+00:00", "updated_at": "2022-10-06T18:11:01+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/usbip", "sha256": "8b5cf90d78ca8402e999f90bcad9e8c667d8b5cd3214b24e116094af594be77b", "sha1": "25d44725c911d1d167765546255900e2f0922343", "md5": "c5451963ef6c27d04f45b6e65ff18c2f", "name": "usbip", "size": 300512, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:01+00:00", "updated_at": "2022-10-06T18:11:01+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/libperf-jvmti.so", "sha256": "78372d4ea741ca8603b00bec3356d78944a8c1af4a8a3bb7f6f663aa04d4d3ef", "sha1": "b3a40ae555b9d3bcdf0617a7bf4cbb395557fac3", "md5": "a3ffdf0c915c93fe40878f9065b0e5a9", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:01+00:00", "updated_at": "2022-10-06T18:11:01+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:01+00:00", "updated_at": "2022-10-06T18:11:01+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/cpupower", "sha256": "2f98068b8bc71f137d8e33ea12e9fa27592b4692c7147a5cdffdf6ebf3b67d77", "sha1": "082b3d985092489f4f26f35a05be951e57ff001b", "md5": "010b48716c80339e98b4e9e099c38ccd", "name": "cpupower", "size": 337952, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:01+00:00", "updated_at": "2022-10-06T18:11:01+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/perf", "sha256": "da1d3aa594b5a12a04ae0b40e7fd1181ed5a0b4e1c34ec25e474aa67cbd68097", "sha1": "25f0dd49616fd96d4d1f63b98fde044d02172982", "md5": "ba8c69e6292492ab4521c365ca0ce9cd", "name": "perf", "size": 21840880, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:02+00:00", "updated_at": "2022-10-06T18:11:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/acpidbg", "sha256": "099506a8f39c13454e1e0c993b9db73ee4b1b32e2e6b6a545a802da66d59f683", "sha1": "aa5f56f60df3973a257b66ad63f234013a9cae31", "md5": "111fee09b837060527603fbc84ebd437", "name": "acpidbg", "size": 914040, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:02+00:00", "updated_at": "2022-10-06T18:11:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/bpftool", "sha256": "0ee8c9ac41429a4c046ff9b9b569f8cb8cf07c8a9e079abb7bfaa0526f1a042e", "sha1": "a759519e4ee0e8df5c65fe18f6302654590521fb", "md5": "459d61c2a2d3e5df44aa693795d838c0", "name": "bpftool", "size": 552632, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:02+00:00", "updated_at": "2022-10-06T18:11:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/usbipd", "sha256": "18df7b776da5a74c2dabbdc4d18d976ca7a679e86a321579688dbc2c1948b8dc", "sha1": "083b97b5eae0e6327e6648d072256db300daf1f6", "md5": "6138e206204788fba5578e744fa0a687", "name": "usbipd", "size": 297128, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:02+00:00", "updated_at": "2022-10-06T18:11:02+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1054/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 4810443, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-10-06T18:11:02+00:00", "updated_at": "2022-10-06T18:11:02+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-42720", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1056.60", "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb" }, "created_at": "2022-10-20T17:16:57+00:00", "updated_at": "2022-10-20T17:16:57+00:00" }, { "name": "CVE-2022-42721", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1056.60", "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb" }, "created_at": "2022-10-20T18:10:45+00:00", "updated_at": "2022-10-20T18:10:45+00:00" }, { "name": "CVE-2022-41674", "risk": 81, "source": "USN", "sid": null, "fixed": { "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1056.60", "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb" }, "created_at": "2022-10-20T18:33:23+00:00", "updated_at": "2022-10-20T18:33:23+00:00" }, { "name": "CVE-2022-2602", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1056.60", "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb" }, "created_at": "2022-10-20T19:23:46+00:00", "updated_at": "2022-10-20T19:23:46+00:00" }, { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:06:20+00:00", "updated_at": "2022-11-21T11:06:20+00:00" }, { "name": "CVE-2022-2153", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:10:06+00:00", "updated_at": "2022-11-21T11:10:06+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:11:14+00:00", "updated_at": "2022-11-21T11:11:14+00:00" }, { "name": "CVE-2022-41222", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:28:41+00:00", "updated_at": "2022-11-21T11:28:41+00:00" }, { "name": "CVE-2022-2978", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:02+00:00", "updated_at": "2022-11-21T11:29:02+00:00" }, { "name": "CVE-2022-3625", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:31+00:00", "updated_at": "2022-11-21T11:29:31+00:00" }, { "name": "CVE-2022-20422", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:55+00:00", "updated_at": "2022-11-21T11:29:55+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:15+00:00", "updated_at": "2022-11-21T11:30:15+00:00" }, { "name": "CVE-2022-3635", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:34+00:00", "updated_at": "2022-11-21T11:30:34+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:46+00:00", "updated_at": "2022-11-21T11:30:46+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:31:00+00:00", "updated_at": "2022-11-21T11:31:00+00:00" }, { "name": "CVE-2022-3028", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-22T10:38:25+00:00", "updated_at": "2022-11-22T10:38:25+00:00" }, { "name": "CVE-2022-3633", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:27:47+00:00", "updated_at": "2023-04-21T09:27:47+00:00" }, { "name": "CVE-2022-3629", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:28:29+00:00", "updated_at": "2023-04-21T09:28:29+00:00" }, { "name": "CVE-2023-1095", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:31:07+00:00", "updated_at": "2023-04-21T09:31:07+00:00" }, { "name": "CVE-2023-2513", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-06-06T10:18:58+00:00", "updated_at": "2023-06-06T10:18:58+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-10-05T10:29:01+00:00", "updated_at": "2022-10-06T17:11:00+00:00", "deleted_at": null }