84c54dcf673a474f05af8123e8ac53f22cc4704a8ed06c33d868bbf05c607029
0d227ec4ef6709ba4b99a0b8ea668b3e56127239
b7fef708212a60dbdad81b0bf7610746
5.4.0-1077.83
linux-gke-tools-5.4.0-1077_5.4.0-1077.83_amd64.deb
23301
DEB
linux-gke
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1077 /usr/lib/libcpupower.so.5.4.0-1077 | 97800 | 0 | ||
usbip /usr/lib/linux-gke-tools-5.4.0-1077/usbip | 300504 | 0 | ||
turbostat /usr/lib/linux-gke-tools-5.4.0-1077/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gke-tools-5.4.0-1077/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gke-tools-5.4.0-1077/perf | 21825312 | 0 | ||
bpftool /usr/lib/linux-gke-tools-5.4.0-1077/bpftool | 552576 | 0 | ||
usbipd /usr/lib/linux-gke-tools-5.4.0-1077/usbipd | 297120 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gke-tools-5.4.0-1077/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-1195 | 0 | USN | |
CVE-2022-1199 | 0 | USN | |
CVE-2022-1204 | 55 | USN | |
CVE-2022-1205 | 47 | USN | |
CVE-2022-33981 | 0 | USN | |
CVE-2022-1789 | 0 | USN | |
CVE-2022-28388 | 78 | USN | |
CVE-2022-41858 | 7 | USN | |
CVE-2022-2639 | 78 | USN | |
CVE-2022-2991 | 67 | USN |
{ "sha256": "84c54dcf673a474f05af8123e8ac53f22cc4704a8ed06c33d868bbf05c607029", "sha1": "0d227ec4ef6709ba4b99a0b8ea668b3e56127239", "md5": "b7fef708212a60dbdad81b0bf7610746", "type": "DEB", "arch": "AMD64", "name": "linux-gke-tools-5.4.0-1077", "filename": "linux-gke-tools-5.4.0-1077_5.4.0-1077.83_amd64.deb", "size": 23301, "description": "Linux kernel version specific tools for version 5.4.0-1077\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1077 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1077-<flavour>.", "url": null, "version": "5.4.0-1077.83", "source": "linux-gke", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1077", "sha256": "a0eb7a6c694880e7abedabfca942ab098867a8602b171ae1c00fcf401f7ce568", "sha1": "667a4394e160be0d78e57c4d67907ae831474aa5", "md5": "b73ead36c8e6e5e5ebad16aeca2898e5", "name": "libcpupower.so.5.4.0-1077", "size": 97800, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:38+00:00", "updated_at": "2022-07-08T02:46:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1077/usbip", "sha256": "1bd2b8670da5c31c89b7f6c66f4dde77a6a63dd3db57f95998afa648b97a4dc1", "sha1": "8ac87549d5145fdde0985e37e18d420aaeb44dcb", "md5": "39dd9ec1f56b106ab4127bf1b2f3cad9", "name": "usbip", "size": 300504, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:38+00:00", "updated_at": "2022-07-08T02:46:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1077/turbostat", "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785", "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846", "md5": "3dca491f8622de5e10e9125e01b85e3e", "name": "turbostat", "size": 134424, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:38+00:00", "updated_at": "2022-07-08T02:46:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1077/cpupower", "sha256": "1faa4c46ee9289ffb0de52e715858c4f12e232b06467efd97ae19e1b81cb1846", "sha1": "839613d793e830bd9556706fc706bc729f19f3ab", "md5": "ecca2f48cf0ffcd5ef892572d8314f6d", "name": "cpupower", "size": 337952, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:38+00:00", "updated_at": "2022-07-08T02:46:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1077/perf", "sha256": "cd5f55e1a74b8dedf18fe22d542152ea2c5d3cb66c6b22bfcdc4a866ebee87fd", "sha1": "93db189f0228637929d3a4c0b002d560011f9322", "md5": "df8c70a27b81e602d6fe4b4015f2c1b1", "name": "perf", "size": 21825312, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:39+00:00", "updated_at": "2022-07-08T02:46:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1077/bpftool", "sha256": "c9d4065bb2a33269380c53128906f2e7656f2a3535033a859116b82a7207a38a", "sha1": "56b268f1e12cd0cfd0ec1042d723aae631b59d8a", "md5": "b7155c3f8e93b1e3a9e99996eac91aed", "name": "bpftool", "size": 552576, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:39+00:00", "updated_at": "2022-07-08T02:46:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1077/usbipd", "sha256": "eb60009c418cf7464e2940e5e232d499ca8a0239e48aab8a2665c2a147fd2208", "sha1": "092c7833c947bf1a2edfb500e3e6c75358e24116", "md5": "d8476be9332668b476089c31664b30fd", "name": "usbipd", "size": 297120, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:39+00:00", "updated_at": "2022-07-08T02:46:39+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1077/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3831129, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-08T02:46:39+00:00", "updated_at": "2022-07-08T02:46:39+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-1195", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:51:15+00:00", "updated_at": "2022-07-14T02:51:15+00:00" }, { "name": "CVE-2022-1199", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:52:56+00:00", "updated_at": "2022-07-14T02:52:56+00:00" }, { "name": "CVE-2022-1204", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:53:35+00:00", "updated_at": "2022-07-14T02:53:35+00:00" }, { "name": "CVE-2022-1205", "risk": 47, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:54:56+00:00", "updated_at": "2022-07-14T02:54:56+00:00" }, { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:58:35+00:00", "updated_at": "2022-07-14T02:58:35+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-14T02:59:09+00:00", "updated_at": "2022-07-14T02:59:09+00:00" }, { "name": "CVE-2022-28388", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-14T02:21:41+00:00", "updated_at": "2022-08-14T02:21:41+00:00" }, { "name": "CVE-2022-41858", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:07:57+00:00", "updated_at": "2023-02-15T11:07:57+00:00" }, { "name": "CVE-2022-2639", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:23:09+00:00", "updated_at": "2023-02-15T11:23:09+00:00" }, { "name": "CVE-2022-2991", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:38:55+00:00", "updated_at": "2023-04-21T09:38:55+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-07T07:39:36+00:00", "updated_at": "2022-07-08T01:46:37+00:00", "deleted_at": null }