Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (17)

linux-tools-5.15.0-68

Hashes
Linux kernel version specific tools for version 5.15.0-68 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.15.0-68 on 64 bit x86. You probably want to install linux-tools-5.15.0-68-<flavour>.
  • SHA256: 821145fa573e24041dc31a5665a8386a0b1fadb01fd63c453075c7c0ec8a6ede
  • SHA1: 09139c76783fb0699abb6b9c0b06adda1c3d8aa9
  • MD5: d11117eb0614956276736530daf63627
Information
  • Version: 5.15.0-68.75
  • Filename: linux-tools-5.15.0-68_5.15.0-68.75_amd64.deb
  • Size: 26064
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.15.0-68
/usr/lib/libcpupower.so.5.15.0-68
817760
usbip
/usr/lib/linux-tools-5.15.0-68/usbip
2489200
libperf-jvmti.so
/usr/lib/linux-tools-5.15.0-68/libperf-jvmti.so
2160880
turbostat
/usr/lib/linux-tools-5.15.0-68/turbostat
1435440
cpupower
/usr/lib/linux-tools-5.15.0-68/cpupower
2944160
perf
/usr/lib/linux-tools-5.15.0-68/perf
223613600
acpidbg
/usr/lib/linux-tools-5.15.0-68/acpidbg
9342640
bpftool
/usr/lib/linux-tools-5.15.0-68/bpftool
15946320
usbipd
/usr/lib/linux-tools-5.15.0-68/usbipd
2493200
x86_energy_perf_policy
/usr/lib/linux-tools-5.15.0-68/x86_energy_perf_policy
466160

Vulnerabilities

NameRiskSourceFixed
CVE-2023-00450USN
linux-source-5.15.0
5.15.0-69.76
CVE-2022-484238USN
linux-source-5.15.0
5.15.0-69.76
CVE-2022-34248USN
linux-source-5.15.0
5.15.0-69.76
CVE-2022-484248USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-02108USN
linux-source-5.15.0
5.15.0-69.76
CVE-2022-4121855USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-283280USN
linux-source-5.15.0
5.15.0-69.76
CVE-2022-43826USN
linux-source-5.15.0
5.15.0-69.76
CVE-2022-3628055USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-234550USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-235590USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-234540USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-266068USN
linux-source-5.15.0
5.15.0-69.76
CVE-2022-21969USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-02668USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-265448USN
linux-source-5.15.0
5.15.0-69.76
CVE-2023-33570USN
linux-source-5.15.0
5.15.0-69.76

Raw Object

{
  "sha256": "821145fa573e24041dc31a5665a8386a0b1fadb01fd63c453075c7c0ec8a6ede",
  "sha1": "09139c76783fb0699abb6b9c0b06adda1c3d8aa9",
  "md5": "d11117eb0614956276736530daf63627",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-tools-5.15.0-68",
  "filename": "linux-tools-5.15.0-68_5.15.0-68.75_amd64.deb",
  "size": 26064,
  "description": "Linux kernel version specific tools for version 5.15.0-68\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-68 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-68-<flavour>.",
  "url": null,
  "version": "5.15.0-68.75",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.15.0-68",
      "sha256": "bc67b7079d048a5635dc98d3814f48f7046f376f071dc2b21fbba5ed6010f57a",
      "sha1": "a79523efc674a37ffc77855a7f6beeb5aba51faf",
      "md5": "249d6ee7e515fa2158d95b5dc0e230fe",
      "name": "libcpupower.so.5.15.0-68",
      "size": 81776,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/usbip",
      "sha256": "8d354831484f94aa1e51a200cdc7d5ace457229b858459d8ee0cfae572b1882a",
      "sha1": "32ef4f3392548606222526dafe3889815084123c",
      "md5": "f775144fe95b7c8520c88467fa441952",
      "name": "usbip",
      "size": 248920,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/libperf-jvmti.so",
      "sha256": "f757691c857bafc713b36ad4037900df5ea2f048e3c6e04c55ede705cf6eb18c",
      "sha1": "91ef68b168dc422576ecbb51a427d6e0ae3f4221",
      "md5": "f50aecff0adbc33b7f37c2887d8c1405",
      "name": "libperf-jvmti.so",
      "size": 216088,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/turbostat",
      "sha256": "11f39965019c0ad6d8e43a6ce02749543eb26cc68164f58ee797a89886d64d20",
      "sha1": "c810d09463f3c1cd49656662d11f98c6463644fa",
      "md5": "8f51926061fb7ebc823f4dec3fbf810d",
      "name": "turbostat",
      "size": 143544,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/cpupower",
      "sha256": "be10c396038754488de8694ce6e6b3584776559496bc2f81e4bb129af390d895",
      "sha1": "f348022caaaf88066882f2d9a445d2537caab8e1",
      "md5": "ef87d8aeff4db1bc89cf1209e87c9295",
      "name": "cpupower",
      "size": 294416,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/perf",
      "sha256": "dfd9dac98329051b31d2828ff5c2242de7f189d9f773392fddaed815ab16d8bc",
      "sha1": "9f1542cff7f2a796c4278dbaa3f1eebc05891481",
      "md5": "10e619b69b9c51c71478d8cec4001443",
      "name": "perf",
      "size": 22361360,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/acpidbg",
      "sha256": "92fa564e8e7342215091841d41dd407f2a21bc2aefecfb1216879d1ef3a18b47",
      "sha1": "b44dba89d3b4cc010cb11e1e34af219fb7957c3d",
      "md5": "99303f35fff3340ed1616a80a1f19e11",
      "name": "acpidbg",
      "size": 934264,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/bpftool",
      "sha256": "2851ad0e53622103398e408c0e911fe98adf6fabf68cab4da5509cf2db8c26ac",
      "sha1": "fd1caa19d795939ecb1b014c3583c34a2efaeae0",
      "md5": "43509078e37371fd625539926b7007dd",
      "name": "bpftool",
      "size": 1594632,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/usbipd",
      "sha256": "4cceeebc16a71832e67e2124abf420a216dfec132528a18e143060f3f04c7fd6",
      "sha1": "2bf473971edc2c09979f932538b473aaa4f5149c",
      "md5": "e4057afa4f04c3f78eab5b1a2e70c168",
      "name": "usbipd",
      "size": 249320,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.15.0-68/x86_energy_perf_policy",
      "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643",
      "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5",
      "md5": "e9d52e1dde799b718aef361de0e9b299",
      "name": "x86_energy_perf_policy",
      "size": 46616,
      "description": null,
      "package": 5171603,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-03-03T10:22:12+00:00",
      "updated_at": "2023-03-03T10:22:12+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T09:52:09+00:00",
      "updated_at": "2023-03-29T09:52:09+00:00"
    },
    {
      "name": "CVE-2022-48423",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T09:57:03+00:00",
      "updated_at": "2023-03-29T09:57:03+00:00"
    },
    {
      "name": "CVE-2022-3424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T09:57:39+00:00",
      "updated_at": "2023-03-29T09:57:39+00:00"
    },
    {
      "name": "CVE-2022-48424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T09:57:49+00:00",
      "updated_at": "2023-03-29T09:57:49+00:00"
    },
    {
      "name": "CVE-2023-0210",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T09:59:47+00:00",
      "updated_at": "2023-03-29T09:59:47+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:00:47+00:00",
      "updated_at": "2023-03-29T10:00:47+00:00"
    },
    {
      "name": "CVE-2023-28328",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:02:55+00:00",
      "updated_at": "2023-03-29T10:02:55+00:00"
    },
    {
      "name": "CVE-2022-4382",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:05:23+00:00",
      "updated_at": "2023-03-29T10:05:23+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:11:51+00:00",
      "updated_at": "2023-03-29T10:11:51+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:12:37+00:00",
      "updated_at": "2023-03-29T10:12:37+00:00"
    },
    {
      "name": "CVE-2023-23559",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:12:51+00:00",
      "updated_at": "2023-03-29T10:12:51+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:13:07+00:00",
      "updated_at": "2023-03-29T10:13:07+00:00"
    },
    {
      "name": "CVE-2023-26606",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:13:32+00:00",
      "updated_at": "2023-03-29T10:13:32+00:00"
    },
    {
      "name": "CVE-2022-2196",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:13:42+00:00",
      "updated_at": "2023-03-29T10:13:42+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-03-29T10:14:42+00:00",
      "updated_at": "2023-03-29T10:14:42+00:00"
    },
    {
      "name": "CVE-2023-26544",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-04-21T09:36:19+00:00",
      "updated_at": "2023-04-21T09:36:19+00:00"
    },
    {
      "name": "CVE-2023-3357",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7613e3aac64afec59574fe601f527311af947533fc9afbe0027bf05c1691af1c",
        "name": "linux-source-5.15.0",
        "version": "5.15.0-69.76",
        "filename": "linux-source-5.15.0_5.15.0-69.76_all.deb"
      },
      "created_at": "2023-07-12T09:59:24+00:00",
      "updated_at": "2023-07-12T09:59:24+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2023-03-01T23:55:08+00:00",
  "updated_at": "2023-03-03T10:22:12+00:00",
  "deleted_at": null
}