585ef2a1c57880c6e76a762bba361c7e380ad78b444205fa980616e2178b1392
3437307dc2887bde4860b9a812728a77d9abee66
6c08c533fa521d86b4c4310ea0d8696c
6.1.0-1008.8
linux-oem-6.1-tools-6.1.0-1008_6.1.0-1008.8_amd64.deb
27689
DEB
linux-oem-6.1
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.6.1.0-1008 /usr/lib/libcpupower.so.6.1.0-1008 | 84904 | 0 | ||
usbip /usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbip | 248952 | 0 | ||
libperf-jvmti.so /usr/lib/linux-oem-6.1-tools-6.1.0-1008/libperf-jvmti.so | 220040 | 0 | ||
turbostat /usr/lib/linux-oem-6.1-tools-6.1.0-1008/turbostat | 148472 | 0 | ||
cpupower /usr/lib/linux-oem-6.1-tools-6.1.0-1008/cpupower | 299184 | 0 | ||
perf /usr/lib/linux-oem-6.1-tools-6.1.0-1008/perf | 24012960 | 0 | ||
acpidbg /usr/lib/linux-oem-6.1-tools-6.1.0-1008/acpidbg | 934280 | 0 | ||
bpftool /usr/lib/linux-oem-6.1-tools-6.1.0-1008/bpftool | 1761616 | 0 | ||
usbipd /usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbipd | 249352 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-6.1-tools-6.1.0-1008/x86_energy_perf_policy | 46616 | 0 |
{ "sha256": "585ef2a1c57880c6e76a762bba361c7e380ad78b444205fa980616e2178b1392", "sha1": "3437307dc2887bde4860b9a812728a77d9abee66", "md5": "6c08c533fa521d86b4c4310ea0d8696c", "type": "DEB", "arch": "AMD64", "name": "linux-oem-6.1-tools-6.1.0-1008", "filename": "linux-oem-6.1-tools-6.1.0-1008_6.1.0-1008.8_amd64.deb", "size": 27689, "description": "Linux kernel version specific tools for version 6.1.0-1008\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 6.1.0-1008 on\n64 bit x86.\nYou probably want to install linux-tools-6.1.0-1008-<flavour>.", "url": null, "version": "6.1.0-1008.8", "source": "linux-oem-6.1", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.6.1.0-1008", "sha256": "0199022a7dadbcaab2170a54f8c7b6fdc26663d9f45480d6f6d2773537bdec27", "sha1": "426b9b88c6b340f1df71323e712cceed6297daa6", "md5": "f265e1113bea0bc6102f9908c6211dd9", "name": "libcpupower.so.6.1.0-1008", "size": 84904, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbip", "sha256": "699c7d8e4ac788ce87c3e977805086194d4c4b709878690314f294651a04ef70", "sha1": "dd76d0f891a291fc8732e65d272ec8d3e6db296b", "md5": "f78aa74167474559d6d3bffaf9d7a501", "name": "usbip", "size": 248952, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/libperf-jvmti.so", "sha256": "b176bf46295f38e72c573756932d72edd4593e17e7e1607a9c7d7d3316b053a2", "sha1": "e2573748dfdc40ccee2bc3d5ab8c37df207013d6", "md5": "07af5b265767d0cb60390da1d4f856a2", "name": "libperf-jvmti.so", "size": 220040, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/turbostat", "sha256": "690f49d45bbd407119cfecd6a63179bf8e31f46a5b97775e579c60d5448bf9fb", "sha1": "1842101af3ef4cdcbfaf97032c025a83e0c62741", "md5": "a7505cd70313122501a9a53aeae512d5", "name": "turbostat", "size": 148472, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/cpupower", "sha256": "78c9b31207fb4c1c7fc55809b2628b031148dd2fe72b7d131be12de2140e653d", "sha1": "73ec134daeff0f206d8d4c5b8772de14c2ada4cb", "md5": "210fec0f47c4401d8ba6e1835546953f", "name": "cpupower", "size": 299184, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/perf", "sha256": "b428ba3a89a52e3721e884ce10ab9051dcdbca42b0c6ae5200a724a799d9be99", "sha1": "fb55751d7b98f8df8d3683a6247482a9f2881e2f", "md5": "5d72db5d085c809dad8593d63f863eac", "name": "perf", "size": 24012960, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/acpidbg", "sha256": "f40e6be092f12e5b8cc3b68b506e4052bf35f0ee76d6975d2bd31997eb3afd1c", "sha1": "9a9176c14c23b2dff96f18fe4700098c0969684a", "md5": "078681054d1b2c7b2751b44911b70e85", "name": "acpidbg", "size": 934280, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/bpftool", "sha256": "187f945ea9e2f7d19007dd93d8f4496141713473547a9f1b998dce69aafb6177", "sha1": "0879e8d1c845c21de6fd39acfbdaf1b5465f7c3e", "md5": "1177f7b83c3b691204e09e403c893e53", "name": "bpftool", "size": 1761616, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/usbipd", "sha256": "3749b6c73efc0d4ab1f801d6934708ccae7945c1e4b35db9d63791ff2849e0dd", "sha1": "49abea10f7ae1bd55c92b3b70927ad02d5a23318", "md5": "edd27dde4c0fd75d7f907c1dfeda3b78", "name": "usbipd", "size": 249352, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.1-tools-6.1.0-1008/x86_energy_perf_policy", "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643", "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5", "md5": "e9d52e1dde799b718aef361de0e9b299", "name": "x86_energy_perf_policy", "size": 46616, "description": null, "package": 5175802, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-03-05T10:10:35+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2023-1583", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:09:25+00:00", "updated_at": "2023-04-20T09:09:25+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:09:25+00:00", "updated_at": "2023-04-20T09:09:25+00:00" }, { "name": "CVE-2023-28466", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:10:13+00:00", "updated_at": "2023-04-20T09:10:13+00:00" }, { "name": "CVE-2023-1077", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:10:13+00:00", "updated_at": "2023-04-20T09:10:13+00:00" }, { "name": "CVE-2023-1076", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:18:58+00:00", "updated_at": "2023-04-20T09:18:58+00:00" }, { "name": "CVE-2023-28866", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:19:14+00:00", "updated_at": "2023-04-20T09:19:14+00:00" }, { "name": "CVE-2023-1670", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:19:25+00:00", "updated_at": "2023-04-20T09:19:25+00:00" }, { "name": "CVE-2023-1998", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:20:00+00:00", "updated_at": "2023-04-20T09:20:00+00:00" }, { "name": "CVE-2022-4269", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:20:00+00:00", "updated_at": "2023-04-20T09:20:00+00:00" }, { "name": "CVE-2023-1855", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:20:23+00:00", "updated_at": "2023-04-20T09:20:23+00:00" }, { "name": "CVE-2023-30456", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:20:58+00:00", "updated_at": "2023-04-20T09:20:58+00:00" }, { "name": "CVE-2023-1079", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:21:28+00:00", "updated_at": "2023-04-20T09:21:28+00:00" }, { "name": "CVE-2023-1990", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:21:41+00:00", "updated_at": "2023-04-20T09:21:41+00:00" }, { "name": "CVE-2023-1032", "risk": null, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:21:54+00:00", "updated_at": "2023-04-20T09:21:54+00:00" }, { "name": "CVE-2023-1989", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:22:35+00:00", "updated_at": "2023-04-20T09:22:35+00:00" }, { "name": "CVE-2023-25012", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:22:49+00:00", "updated_at": "2023-04-20T09:22:49+00:00" }, { "name": "CVE-2023-1118", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-04-20T09:23:05+00:00", "updated_at": "2023-04-20T09:23:05+00:00" }, { "name": "CVE-2023-30772", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-05-13T11:14:15+00:00", "updated_at": "2023-05-13T11:14:15+00:00" }, { "name": "CVE-2023-2194", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-05-13T13:51:06+00:00", "updated_at": "2023-05-13T13:51:06+00:00" }, { "name": "CVE-2023-2235", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-06-06T09:37:34+00:00", "updated_at": "2023-06-06T09:37:34+00:00" }, { "name": "CVE-2023-33203", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-06-06T09:43:19+00:00", "updated_at": "2023-06-06T09:43:19+00:00" }, { "name": "CVE-2023-33288", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-06-06T10:10:32+00:00", "updated_at": "2023-06-06T10:10:32+00:00" }, { "name": "CVE-2023-3220", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-08-09T09:28:57+00:00", "updated_at": "2023-08-09T09:28:57+00:00" }, { "name": "CVE-2023-3355", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-09-13T10:02:40+00:00", "updated_at": "2023-09-13T10:02:40+00:00" }, { "name": "CVE-2023-2985", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "d009bdcd314d03ec71e3c03fc7fae76ff1b5738c86a7a6be410d7a554175e904", "name": "linux-oem-6.1-tools-host", "version": "6.1.0-1009.9", "filename": "linux-oem-6.1-tools-host_6.1.0-1009.9_all.deb" }, "created_at": "2023-09-13T10:48:33+00:00", "updated_at": "2023-09-13T10:48:33+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-03-03T11:30:09+00:00", "updated_at": "2023-03-05T10:10:35+00:00", "deleted_at": null }