5e706198335372f711970ec9043894867377b71bceed1114ff7b761b01f86eca
6f4b69659cbed6fbd434ccd178ae2636fecc2eb9
b767257cc9c923b446fa5eb386956e98
5.4.0-1057.61
linux-gkeop-tools-5.4.0-1057_5.4.0-1057.61_amd64.deb
24486
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1057 /usr/lib/libcpupower.so.5.4.0-1057 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1057/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1057/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1057/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1057/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1057/perf | 21842736 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1057/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1057/bpftool | 552696 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1057/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1057/x86_energy_perf_policy | 38544 | 0 |
{ "sha256": "5e706198335372f711970ec9043894867377b71bceed1114ff7b761b01f86eca", "sha1": "6f4b69659cbed6fbd434ccd178ae2636fecc2eb9", "md5": "b767257cc9c923b446fa5eb386956e98", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1057", "filename": "linux-gkeop-tools-5.4.0-1057_5.4.0-1057.61_amd64.deb", "size": 24486, "description": "Linux kernel version specific tools for version 5.4.0-1057\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1057 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1057-<flavour>.", "url": null, "version": "5.4.0-1057.61", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1057", "sha256": "fdec0360cc20d7df2fd78dbbccb432cbc4aac1bed24d52254d5db887e8bcf058", "sha1": "07ae4385432679a318386c06d7c1977d98b1c626", "md5": "f2853af10a85e2166e593484dfda806b", "name": "libcpupower.so.5.4.0-1057", "size": 97800, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/usbip", "sha256": "bd2cf8fec85eb18d9683ae80a0051a26d61cfa06d6933feb7e7d7784603a1325", "sha1": "30dede105667c2bfabd84c8e5dabf2c9517eae66", "md5": "c723e104f8020a7766ed1e9e59f21f19", "name": "usbip", "size": 300512, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/libperf-jvmti.so", "sha256": "7f36b45b4eb33efdebe9498f8d78c7d18b735c466fb5ab50c04da80ae5982f06", "sha1": "eb3ae5c9713ce89e2e4ebd8ed4b948b209f4a012", "md5": "c234ac34df1f22ed760cd12fa75a9aab", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/cpupower", "sha256": "51582f9b512bdd909fbdeb39f0504de5a208738b45e59b3f8b7532aa8c2179a4", "sha1": "082be2061f15ae2846421d1c74f27b70e35ca93e", "md5": "df4a6d96db050e5fb048a14919112794", "name": "cpupower", "size": 337952, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/perf", "sha256": "20f7db821a1f1971c41563ed25db979279f88172b578acde74f0738f5ba86379", "sha1": "02b9918289e20104ba838d5f8dd09db1870708a8", "md5": "54042391a8034d27096e0ea68e7f3f92", "name": "perf", "size": 21842736, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/acpidbg", "sha256": "3656831ce7c34533608e0b2f5214ef80ec9a85180587844c77d468f925c39800", "sha1": "d2c45422ddf723a4ed5d0f1dccd1937e18e33b1d", "md5": "94d05cfca05cfc24bb0c8914d29420a5", "name": "acpidbg", "size": 914040, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/bpftool", "sha256": "1cee19d9e737d7f632c1392ce81ad63273460b65e2061032807792a46208a74f", "sha1": "4b3d53fb3294585a3037559a557687381178f810", "md5": "e8c7ee3b2c729c0660d3ef8299d02da2", "name": "bpftool", "size": 552696, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/usbipd", "sha256": "e7bee4887b8d2859d8b2d15a10bf9edd65bfe31848ef6e5cc3c4291beaef9385", "sha1": "1c0a4bfc5a27c4c8f857bcf39c62ffe6e29ee22e", "md5": "0ee9ea2f91d290a1d02972eb12693fac", "name": "usbipd", "size": 297128, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1057/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 4861205, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-02T10:26:59+00:00", "updated_at": "2022-11-02T10:26:59+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1060.64", "filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb" }, "created_at": "2022-12-02T12:33:11+00:00", "updated_at": "2022-12-02T12:33:11+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1060.64", "filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb" }, "created_at": "2022-12-02T12:41:58+00:00", "updated_at": "2022-12-02T12:41:58+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1060.64", "filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb" }, "created_at": "2022-12-02T12:42:45+00:00", "updated_at": "2022-12-02T12:42:45+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1060.64", "filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb" }, "created_at": "2022-12-02T12:43:31+00:00", "updated_at": "2022-12-02T12:43:31+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1060.64", "filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb" }, "created_at": "2022-12-02T12:44:33+00:00", "updated_at": "2022-12-02T12:44:33+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1060.64", "filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb" }, "created_at": "2022-12-02T12:46:00+00:00", "updated_at": "2022-12-02T12:46:00+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1060.64", "filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb" }, "created_at": "2022-12-02T12:46:40+00:00", "updated_at": "2022-12-02T12:46:40+00:00" }, { "name": "CVE-2022-2663", "risk": 53, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T12:00:45+00:00", "updated_at": "2023-01-07T12:00:45+00:00" }, { "name": "CVE-2022-3646", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T12:24:09+00:00", "updated_at": "2023-01-07T12:24:09+00:00" }, { "name": "CVE-2022-3061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T13:03:09+00:00", "updated_at": "2023-01-07T13:03:09+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T14:23:23+00:00", "updated_at": "2023-01-07T14:23:23+00:00" }, { "name": "CVE-2022-43750", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T14:47:36+00:00", "updated_at": "2023-01-07T14:47:36+00:00" }, { "name": "CVE-2022-20421", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T14:50:14+00:00", "updated_at": "2023-01-07T14:50:14+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T15:08:45+00:00", "updated_at": "2023-01-07T15:08:45+00:00" }, { "name": "CVE-2022-39842", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T15:34:32+00:00", "updated_at": "2023-01-07T15:34:32+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T15:37:07+00:00", "updated_at": "2023-01-07T15:37:07+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-01-07T15:37:38+00:00", "updated_at": "2023-01-07T15:37:38+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-02-18T11:46:10+00:00", "updated_at": "2023-02-18T11:46:10+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-04-01T10:40:53+00:00", "updated_at": "2023-04-01T10:40:53+00:00" }, { "name": "CVE-2022-42432", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-04-21T09:24:16+00:00", "updated_at": "2023-04-21T09:24:16+00:00" }, { "name": "CVE-2023-2860", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1061.65", "filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb" }, "created_at": "2023-07-12T10:07:55+00:00", "updated_at": "2023-07-12T10:07:55+00:00" } ], "risk": 80, "vulnerable": 80, "outdated": 80, "malicious": 0, "created_at": "2022-10-31T08:33:26+00:00", "updated_at": "2022-11-02T10:26:57+00:00", "deleted_at": null }