Zercurity data services
  • Summary
  • Applications (7)
  • Packages (0)
  • Vulnerabilities (20)

linux-tools-4.4.0-137

Hashes
Linux kernel version specific tools for version 4.4.0-137 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.4.0-137 on 32 bit x86. You probably want to install linux-tools-4.4.0-137-<flavour>.
  • SHA256: 66d6e63c1226fc892e3d8e93ec2093ae8ee4bb307635a3046bb9408250414733
  • SHA1: aaf2b24020e36f06728acb6c9029752af7083355
  • MD5: 7a4c20ce7e231e952290265d6570adab
Information
  • Version: 4.4.0-137.163
  • Filename: linux-tools-4.4.0-137_4.4.0-137.163_i386.deb
  • Size: 2365
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libaudit1 (>= 1:2.2.1), libc6 (>= 2.8), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.4.4.0-137
/usr/lib/libcpupower.so.4.4.0-137
178600
perf
/usr/lib/linux-tools-4.4.0-137/perf
17284840
x86_energy_perf_policy
/usr/lib/linux-tools-4.4.0-137/x86_energy_perf_policy
96600
cpupower
/usr/lib/linux-tools-4.4.0-137/cpupower
698920
usbip
/usr/lib/linux-tools-4.4.0-137/usbip
630840
turbostat
/usr/lib/linux-tools-4.4.0-137/turbostat
680520
usbipd
/usr/lib/linux-tools-4.4.0-137/usbipd
508240

Vulnerabilities

NameRiskSourceFixed
CVE-2019-1288178USN
linux-tools-common
4.4.0-138.164
CVE-2018-1473478USN
linux-tools-common
4.4.0-138.164
CVE-2018-1665861USN
linux-tools-common
4.4.0-138.164
CVE-2018-936384USN
linux-tools-common
4.4.0-138.164
CVE-2018-1093871USN
linux-tools-common
4.4.0-138.164
CVE-2019-1288178USN
CVE-2018-1665861USN
USN-3822-2
CVE-2018-1473478USN
USN-3849-2
CVE-2018-936384USN
USN-3822-2
CVE-2018-1093871USN
USN-3797-2
CVE-2018-1093871USN
linux-libc-dev
4.4.0-138.164
CVE-2018-1473478USN
linux-libc-dev
4.4.0-138.164
CVE-2019-1288178USN
linux-libc-dev
4.4.0-138.164
CVE-2018-1665861USN
linux-libc-dev
4.4.0-138.164
CVE-2018-936384USN
linux-libc-dev
4.4.0-138.164
CVE-2019-1288178USN
linux-source-4.4.0
4.4.0-138.164
CVE-2018-1093871USN
linux-source-4.4.0
4.4.0-138.164
CVE-2018-1473478USN
linux-source-4.4.0
4.4.0-138.164
CVE-2018-936384USN
linux-source-4.4.0
4.4.0-138.164
CVE-2018-1665861USN
linux-source-4.4.0
4.4.0-138.164

Raw Object

{
  "sha256": "66d6e63c1226fc892e3d8e93ec2093ae8ee4bb307635a3046bb9408250414733",
  "sha1": "aaf2b24020e36f06728acb6c9029752af7083355",
  "md5": "7a4c20ce7e231e952290265d6570adab",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-tools-4.4.0-137",
  "filename": "linux-tools-4.4.0-137_4.4.0-137.163_i386.deb",
  "size": 2365,
  "description": "Linux kernel version specific tools for version 4.4.0-137\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.4.0-137 on\n32 bit x86.\nYou probably want to install linux-tools-4.4.0-137-<flavour>.",
  "url": null,
  "version": "4.4.0-137.163",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libaudit1 (>= 1:2.2.1), libc6 (>= 2.8), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.4.4.0-137",
      "sha256": "422fef700d3b2dd14ea006497ae6acdf6617a48eb3ca3c42a8806fb47523b820",
      "sha1": "5668eb4488bebb32691eb09af3e6918df47de10b",
      "md5": "5d2188f377448cc02b48c824fd3d0d79",
      "name": "libcpupower.so.4.4.0-137",
      "size": 17860,
      "description": null,
      "package": 2037415,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T18:33:50+00:00",
      "updated_at": "2021-03-20T18:33:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.4.0-137/perf",
      "sha256": "6ce24bac83e57bbe62ddd08d16a2f40909bffd3d285a63a912d6843f57fa15b6",
      "sha1": "728d466ba9b07634242a05776bb889d77d70ffd0",
      "md5": "889e17672ac48dc835669fd5c447c286",
      "name": "perf",
      "size": 1728484,
      "description": null,
      "package": 2037415,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T18:33:50+00:00",
      "updated_at": "2021-03-20T18:33:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.4.0-137/x86_energy_perf_policy",
      "sha256": "3bf84e86e431fce9ccd470a5df526828ea46fd9115425531913538813f8c5e95",
      "sha1": "126940e3ee6c3d7f23062fa325e31b498d4f55e0",
      "md5": "9eabb62b6d6aa22648d05c480726980e",
      "name": "x86_energy_perf_policy",
      "size": 9660,
      "description": null,
      "package": 2037415,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T18:33:50+00:00",
      "updated_at": "2021-03-20T18:33:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.4.0-137/cpupower",
      "sha256": "66f7c5a03f86a438fd10120d6f70c9758b357ced2283bbeae0bf314f2951fe51",
      "sha1": "74dcd2a1bd14f9cfae879e80d228e8e4db8504f6",
      "md5": "04a75372c6ac748b8754732046f639e2",
      "name": "cpupower",
      "size": 69892,
      "description": null,
      "package": 2037415,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T18:33:50+00:00",
      "updated_at": "2021-03-20T18:33:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.4.0-137/usbip",
      "sha256": "f965786d40a4bcf761fdc2a04bb0dca5014317c601f7e03432e88f529d32e8d1",
      "sha1": "e132105a3ee07a005d256cd9ba33fb74b72fddaa",
      "md5": "d662cee585f1c9c069921cbcf30267d9",
      "name": "usbip",
      "size": 63084,
      "description": null,
      "package": 2037415,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T18:33:50+00:00",
      "updated_at": "2021-03-20T18:33:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.4.0-137/turbostat",
      "sha256": "01754da8643cf0451a6306db30e0245839e7feed836c1a146b109f50ab1a9d92",
      "sha1": "ca9580bf6ad9f8cde72ad06a7927caf18177c621",
      "md5": "1183abdd3465297c994c100df61f80c1",
      "name": "turbostat",
      "size": 68052,
      "description": null,
      "package": 2037415,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T18:33:50+00:00",
      "updated_at": "2021-03-20T18:33:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.4.0-137/usbipd",
      "sha256": "0495a0b8e5975402684e58d783fe2d6dc029793551da6bf24c6ed306da5b6c22",
      "sha1": "19e0da47e2b36796439d63d87966f54efd192766",
      "md5": "9d0fc3a4f585b80d8a5e33461971cb42",
      "name": "usbipd",
      "size": 50824,
      "description": null,
      "package": 2037415,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T18:33:50+00:00",
      "updated_at": "2021-03-20T18:33:50+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2019-12881",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f00ac6276519995663df7b95811b4e29763d14d54dd5aa2c825d60a6ab133467",
        "name": "linux-tools-common",
        "version": "4.4.0-138.164",
        "filename": "linux-tools-common_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-07-09T22:19:22+00:00",
      "updated_at": "2021-07-09T22:19:22+00:00"
    },
    {
      "name": "CVE-2018-14734",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f00ac6276519995663df7b95811b4e29763d14d54dd5aa2c825d60a6ab133467",
        "name": "linux-tools-common",
        "version": "4.4.0-138.164",
        "filename": "linux-tools-common_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-07-10T01:34:12+00:00",
      "updated_at": "2021-07-10T01:34:12+00:00"
    },
    {
      "name": "CVE-2018-16658",
      "risk": 61,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f00ac6276519995663df7b95811b4e29763d14d54dd5aa2c825d60a6ab133467",
        "name": "linux-tools-common",
        "version": "4.4.0-138.164",
        "filename": "linux-tools-common_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-07-10T02:05:07+00:00",
      "updated_at": "2021-07-10T02:05:07+00:00"
    },
    {
      "name": "CVE-2018-9363",
      "risk": 84,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f00ac6276519995663df7b95811b4e29763d14d54dd5aa2c825d60a6ab133467",
        "name": "linux-tools-common",
        "version": "4.4.0-138.164",
        "filename": "linux-tools-common_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-07-10T02:38:37+00:00",
      "updated_at": "2021-07-10T02:38:37+00:00"
    },
    {
      "name": "CVE-2018-10938",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f00ac6276519995663df7b95811b4e29763d14d54dd5aa2c825d60a6ab133467",
        "name": "linux-tools-common",
        "version": "4.4.0-138.164",
        "filename": "linux-tools-common_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-07-10T03:46:57+00:00",
      "updated_at": "2021-07-10T03:46:57+00:00"
    },
    {
      "name": "CVE-2019-12881",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-22T05:12:11+00:00",
      "updated_at": "2021-03-22T05:12:11+00:00"
    },
    {
      "name": "CVE-2018-16658",
      "risk": 61,
      "source": "USN",
      "sid": "USN-3822-2",
      "fixed": null,
      "created_at": "2021-03-22T06:03:16+00:00",
      "updated_at": "2021-03-22T06:03:16+00:00"
    },
    {
      "name": "CVE-2018-14734",
      "risk": 78,
      "source": "USN",
      "sid": "USN-3849-2",
      "fixed": null,
      "created_at": "2021-03-22T06:50:35+00:00",
      "updated_at": "2021-03-22T06:50:35+00:00"
    },
    {
      "name": "CVE-2018-9363",
      "risk": 84,
      "source": "USN",
      "sid": "USN-3822-2",
      "fixed": null,
      "created_at": "2021-03-22T07:20:17+00:00",
      "updated_at": "2021-03-22T07:20:17+00:00"
    },
    {
      "name": "CVE-2018-10938",
      "risk": 71,
      "source": "USN",
      "sid": "USN-3797-2",
      "fixed": null,
      "created_at": "2021-03-22T07:43:40+00:00",
      "updated_at": "2021-03-22T07:43:40+00:00"
    },
    {
      "name": "CVE-2018-10938",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5015b4b004be3bbd115527c81308e935d5782eac647d2bb785c42dbd861f0cdb",
        "name": "linux-libc-dev",
        "version": "4.4.0-138.164",
        "filename": "linux-libc-dev_4.4.0-138.164_i386.deb"
      },
      "created_at": "2021-06-29T22:31:39+00:00",
      "updated_at": "2021-06-29T22:31:39+00:00"
    },
    {
      "name": "CVE-2018-14734",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5015b4b004be3bbd115527c81308e935d5782eac647d2bb785c42dbd861f0cdb",
        "name": "linux-libc-dev",
        "version": "4.4.0-138.164",
        "filename": "linux-libc-dev_4.4.0-138.164_i386.deb"
      },
      "created_at": "2021-06-30T00:32:51+00:00",
      "updated_at": "2021-06-30T00:32:51+00:00"
    },
    {
      "name": "CVE-2019-12881",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5015b4b004be3bbd115527c81308e935d5782eac647d2bb785c42dbd861f0cdb",
        "name": "linux-libc-dev",
        "version": "4.4.0-138.164",
        "filename": "linux-libc-dev_4.4.0-138.164_i386.deb"
      },
      "created_at": "2021-06-30T01:27:37+00:00",
      "updated_at": "2021-06-30T01:27:37+00:00"
    },
    {
      "name": "CVE-2018-16658",
      "risk": 61,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5015b4b004be3bbd115527c81308e935d5782eac647d2bb785c42dbd861f0cdb",
        "name": "linux-libc-dev",
        "version": "4.4.0-138.164",
        "filename": "linux-libc-dev_4.4.0-138.164_i386.deb"
      },
      "created_at": "2021-06-30T02:04:09+00:00",
      "updated_at": "2021-06-30T02:04:09+00:00"
    },
    {
      "name": "CVE-2018-9363",
      "risk": 84,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "5015b4b004be3bbd115527c81308e935d5782eac647d2bb785c42dbd861f0cdb",
        "name": "linux-libc-dev",
        "version": "4.4.0-138.164",
        "filename": "linux-libc-dev_4.4.0-138.164_i386.deb"
      },
      "created_at": "2021-06-30T02:52:11+00:00",
      "updated_at": "2021-06-30T02:52:11+00:00"
    },
    {
      "name": "CVE-2019-12881",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f312a8c76169772d717b14b9ec1c3730cc66328820b58eb296ba92aae93a751",
        "name": "linux-source-4.4.0",
        "version": "4.4.0-138.164",
        "filename": "linux-source-4.4.0_4.4.0-138.164_all.deb"
      },
      "created_at": "2023-06-16T13:04:28+00:00",
      "updated_at": "2023-06-16T13:04:28+00:00"
    },
    {
      "name": "CVE-2018-10938",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f312a8c76169772d717b14b9ec1c3730cc66328820b58eb296ba92aae93a751",
        "name": "linux-source-4.4.0",
        "version": "4.4.0-138.164",
        "filename": "linux-source-4.4.0_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-03-22T05:32:05+00:00",
      "updated_at": "2023-06-16T13:32:46+00:00"
    },
    {
      "name": "CVE-2018-14734",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f312a8c76169772d717b14b9ec1c3730cc66328820b58eb296ba92aae93a751",
        "name": "linux-source-4.4.0",
        "version": "4.4.0-138.164",
        "filename": "linux-source-4.4.0_4.4.0-138.164_all.deb"
      },
      "created_at": "2023-06-16T13:59:40+00:00",
      "updated_at": "2023-06-16T13:59:40+00:00"
    },
    {
      "name": "CVE-2018-9363",
      "risk": 84,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f312a8c76169772d717b14b9ec1c3730cc66328820b58eb296ba92aae93a751",
        "name": "linux-source-4.4.0",
        "version": "4.4.0-138.164",
        "filename": "linux-source-4.4.0_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-03-22T06:27:48+00:00",
      "updated_at": "2023-06-16T14:15:54+00:00"
    },
    {
      "name": "CVE-2018-16658",
      "risk": 61,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "3f312a8c76169772d717b14b9ec1c3730cc66328820b58eb296ba92aae93a751",
        "name": "linux-source-4.4.0",
        "version": "4.4.0-138.164",
        "filename": "linux-source-4.4.0_4.4.0-138.164_all.deb"
      },
      "created_at": "2021-03-22T06:09:48+00:00",
      "updated_at": "2023-06-16T15:08:38+00:00"
    }
  ],
  "risk": 84,
  "vulnerable": 84,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2018-09-25T10:04:12+00:00",
  "updated_at": "2021-03-20T18:33:50+00:00",
  "deleted_at": null
}