5e3cea75118d06ec0483f8b8edc5f1cc2b36e3819c935dd4c0c610bcdef28fd4
f30199f2a121c3187d1870dd760e7b03e57c0272
737df77e8650c62c4f2e0516543b4e43
5.4.0-1053.56
linux-gkeop-tools-5.4.0-1053_5.4.0-1053.56_amd64.deb
24466
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1053 /usr/lib/libcpupower.so.5.4.0-1053 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1053/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1053/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1053/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1053/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1053/perf | 21840128 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1053/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1053/bpftool | 552632 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1053/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1053/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-33741 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-33742 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-36879 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-33744 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2021-4159 | 44 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-26365 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-26373 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-20369 | 67 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-33740 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-2318 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-3176 | 78 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-20566 | 8 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-1462 | 63 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2022-21505 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
CVE-2023-2177 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1054.57 |
{ "sha256": "5e3cea75118d06ec0483f8b8edc5f1cc2b36e3819c935dd4c0c610bcdef28fd4", "sha1": "f30199f2a121c3187d1870dd760e7b03e57c0272", "md5": "737df77e8650c62c4f2e0516543b4e43", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1053", "filename": "linux-gkeop-tools-5.4.0-1053_5.4.0-1053.56_amd64.deb", "size": 24466, "description": "Linux kernel version specific tools for version 5.4.0-1053\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1053 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1053-<flavour>.", "url": null, "version": "5.4.0-1053.56", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1053", "sha256": "b9123d6352d6947046366bdd869bc580e7c99b599a212ad4c0f00652ed232fc7", "sha1": "ec5de97d43991268c8c75377a3c540f595de3b8d", "md5": "1f3e83d7d48b98fbc5599f4dee0b6ebb", "name": "libcpupower.so.5.4.0-1053", "size": 97800, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:39+00:00", "updated_at": "2022-09-04T06:44:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/usbip", "sha256": "434b2e16f93c4f5cf9acdc244fd0bc4c21f3fc1227d92bfa2a59f8683b02b7a1", "sha1": "569ffe05380e9402c82ddc45145a032a71bd3243", "md5": "e183515d41489a347c894862a6312324", "name": "usbip", "size": 300512, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:39+00:00", "updated_at": "2022-09-04T06:44:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/libperf-jvmti.so", "sha256": "9c4e6ccea4eb03286ff0e6224c521c4582c25539e3e1d8ae455b3d273379a155", "sha1": "4ca250661a2d01b2f1591c6d8dffb3e0228810a2", "md5": "88b98d17c82dc68d34052dd8c72e4948", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:39+00:00", "updated_at": "2022-09-04T06:44:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:39+00:00", "updated_at": "2022-09-04T06:44:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/cpupower", "sha256": "9fcb61f86bd2b671004925c8e487b893032b55d568c1a1537a5a76be328be6c4", "sha1": "e6149ea5874d3cd42d4178b1e8446982adbc4ff1", "md5": "17dde7806773e5913a33587eda1fe1ed", "name": "cpupower", "size": 337952, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:39+00:00", "updated_at": "2022-09-04T06:44:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/perf", "sha256": "41199cd9261c92c83e132eedebea118f174128e873e4a3f5aa23377b67a3cefe", "sha1": "61252732a987728a81d8654e3514cc0d4095d159", "md5": "61c010b1f292cc7a5efc1c6b32f2b949", "name": "perf", "size": 21840128, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:40+00:00", "updated_at": "2022-09-04T06:44:40+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/acpidbg", "sha256": "aea886f0760caa7c1331fd2253ab504959dab63eeacd13c7359bdea51aad44d9", "sha1": "5e7419b9f4f9dd6131eaab1a6250d2c981fbd44f", "md5": "8f9d73bcccb2bf0a9e06bd811a77d613", "name": "acpidbg", "size": 914040, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:40+00:00", "updated_at": "2022-09-04T06:44:40+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/bpftool", "sha256": "6a9f030f484afd23c234a6bb0f489af85b612d9c7df3cb591faf960b28bba78f", "sha1": "82c55ce96dc4f3b5a0996c9bc61415172eec1a63", "md5": "f42e9652e82a3d9bdcd6c1126185d475", "name": "bpftool", "size": 552632, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:40+00:00", "updated_at": "2022-09-04T06:44:40+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/usbipd", "sha256": "cdd82d33170cdf6f23b9fd5cd916b5ccf9d5fa5efe0ee09a9210b77b0512edb3", "sha1": "825c9983cb5c535a2ab7e6a12b35133e806d8e26", "md5": "294e550ab40e5ade984358ef8613850a", "name": "usbipd", "size": 297128, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:40+00:00", "updated_at": "2022-09-04T06:44:40+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1053/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3963735, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-09-04T06:44:40+00:00", "updated_at": "2022-09-04T06:44:40+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-33741", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:30:04+00:00", "updated_at": "2022-10-11T17:30:04+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:31:19+00:00", "updated_at": "2022-10-11T17:31:19+00:00" }, { "name": "CVE-2022-36879", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:35:26+00:00", "updated_at": "2022-10-11T17:35:26+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:36:58+00:00", "updated_at": "2022-10-11T17:36:58+00:00" }, { "name": "CVE-2021-4159", "risk": 44, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:37:03+00:00", "updated_at": "2022-10-11T17:37:03+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:37:14+00:00", "updated_at": "2022-10-11T17:37:14+00:00" }, { "name": "CVE-2022-26373", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:37:23+00:00", "updated_at": "2022-10-11T17:37:23+00:00" }, { "name": "CVE-2022-20369", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:37:41+00:00", "updated_at": "2022-10-11T17:37:41+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:38:03+00:00", "updated_at": "2022-10-11T17:38:03+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:38:16+00:00", "updated_at": "2022-10-11T17:38:16+00:00" }, { "name": "CVE-2022-3176", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2022-10-11T17:38:24+00:00", "updated_at": "2022-10-11T17:38:24+00:00" }, { "name": "CVE-2022-20566", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2023-02-18T12:22:30+00:00", "updated_at": "2023-02-18T12:22:30+00:00" }, { "name": "CVE-2022-1462", "risk": 63, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2023-03-07T12:11:27+00:00", "updated_at": "2023-03-07T12:11:27+00:00" }, { "name": "CVE-2022-21505", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2023-04-21T09:38:17+00:00", "updated_at": "2023-04-21T09:38:17+00:00" }, { "name": "CVE-2023-2177", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1054.57", "filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb" }, "created_at": "2023-06-06T09:35:18+00:00", "updated_at": "2023-06-06T09:35:18+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-09-03T12:14:03+00:00", "updated_at": "2022-09-04T05:44:38+00:00", "deleted_at": null }