Zercurity data services
  • Summary
  • Applications (7)
  • Packages (0)
  • Vulnerabilities (10)

linux-gke-tools-4.4.0-1027

Hashes
Linux kernel version specific tools for version 4.4.0-1027 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.4.0-1027 on 64 bit x86. You probably want to install linux-tools-4.4.0-1027-<flavour>.
  • SHA256: 8b9d0a11c08d39a3ca7cb1e9ad54a4a7543ea3aa30ea170455a1c11fecbb9477
  • SHA1: 5ea080705663b81b788602a46c255728bef902ef
  • MD5: c547e50a6d241afaa9cb38ee9ae25b2c
Information
  • Version: 4.4.0-1027.27
  • Filename: linux-gke-tools-4.4.0-1027_4.4.0-1027.27_amd64.deb
  • Size: 2125
  • Type: DEB
  • Source: linux-gke
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils (>= 2.26.1), binutils (<< 2.27), libaudit1 (>= 1:2.2.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
turbostat
/usr/lib/linux-gke-tools-4.4.0-1027/turbostat
734000
cpupower
/usr/lib/linux-gke-tools-4.4.0-1027/cpupower
678960
libcpupower.so.4.4.0-1027
/usr/lib/libcpupower.so.4.4.0-1027
186800
usbip
/usr/lib/linux-gke-tools-4.4.0-1027/usbip
599280
perf
/usr/lib/linux-gke-tools-4.4.0-1027/perf
18357200
usbipd
/usr/lib/linux-gke-tools-4.4.0-1027/usbipd
518080
x86_energy_perf_policy
/usr/lib/linux-gke-tools-4.4.0-1027/x86_energy_perf_policy
104400

Vulnerabilities

NameRiskSourceFixed
CVE-2017-1117678USN
USN-3470-2
CVE-2017-100037178USN
CVE-2017-1108975USN
USN-3620-2
CVE-2017-1807978USN
USN-3655-2
CVE-2017-100037078USN
CVE-2015-783755USN
USN-3405-2
CVE-2017-749555USN
USN-3406-2
CVE-2017-1214670USN
USN-3508-2
CVE-2017-754178USN
USN-3422-2
CVE-2017-1147378USN
USN-3754-1

Raw Object

{
  "sha256": "8b9d0a11c08d39a3ca7cb1e9ad54a4a7543ea3aa30ea170455a1c11fecbb9477",
  "sha1": "5ea080705663b81b788602a46c255728bef902ef",
  "md5": "c547e50a6d241afaa9cb38ee9ae25b2c",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gke-tools-4.4.0-1027",
  "filename": "linux-gke-tools-4.4.0-1027_4.4.0-1027.27_amd64.deb",
  "size": 2125,
  "description": "Linux kernel version specific tools for version 4.4.0-1027\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.4.0-1027 on\n64 bit x86.\nYou probably want to install linux-tools-4.4.0-1027-<flavour>.",
  "url": null,
  "version": "4.4.0-1027.27",
  "source": "linux-gke",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils (>= 2.26.1), binutils (<< 2.27), libaudit1 (>= 1:2.2.1), libc6 (>= 2.14), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libpci3 (>= 1:3.3.1-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/linux-gke-tools-4.4.0-1027/turbostat",
      "sha256": "8ac57e185963afd7c9eafcbfa3a925eb3e4246b1c6ed7cef2fe8d921b7a9ae19",
      "sha1": "de03b24d3661c8e108a10a077edca1224066a297",
      "md5": "931bf4833b483c4d4cfe2b19e54f1e5f",
      "name": "turbostat",
      "size": 73400,
      "description": null,
      "package": 340937,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T07:42:36+00:00",
      "updated_at": "2021-03-04T07:42:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gke-tools-4.4.0-1027/cpupower",
      "sha256": "44c07364a3abb63944d2160ccd8d12d3722f1087166b272bdc76a5ccad2562bb",
      "sha1": "566b1cb0f98d651813d38abcedb9ec2a07445a0f",
      "md5": "ffc1886c7ec4616982a130e7942b9ac5",
      "name": "cpupower",
      "size": 67896,
      "description": null,
      "package": 340937,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T07:42:36+00:00",
      "updated_at": "2021-03-04T07:42:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/libcpupower.so.4.4.0-1027",
      "sha256": "e64d98db5eeced76f89cf3e2e873aff895402ac3593ec99d50588c412b6aa03a",
      "sha1": "5edd5b2a81bf8c2d06adace39394c42b97b06203",
      "md5": "fd2b5fe5fc93b03bd13c2d1b892eebc9",
      "name": "libcpupower.so.4.4.0-1027",
      "size": 18680,
      "description": null,
      "package": 340937,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T07:42:36+00:00",
      "updated_at": "2021-03-04T07:42:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gke-tools-4.4.0-1027/usbip",
      "sha256": "4a3a1e2966700e9e02c337a351c71e7e2438b4cb6f3838f2a6d984041c85eae0",
      "sha1": "73246e791d5d0556820267d6b30fa173f3525967",
      "md5": "89cddc6b17bf0ae6b83516ad1ffb3bbd",
      "name": "usbip",
      "size": 59928,
      "description": null,
      "package": 340937,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T07:42:36+00:00",
      "updated_at": "2021-03-04T07:42:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gke-tools-4.4.0-1027/perf",
      "sha256": "87807608717d67297293711405e28ab7fea83412d26474d1f866fade08da3fab",
      "sha1": "a6787c553a472da33435b2109df5fbcf5599f83a",
      "md5": "3259009a195cafded7382e579421f31e",
      "name": "perf",
      "size": 1835720,
      "description": null,
      "package": 340937,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T07:42:36+00:00",
      "updated_at": "2021-03-04T07:42:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gke-tools-4.4.0-1027/usbipd",
      "sha256": "838c07d0a2c3e63a6fd064ba51160f71a3dee07af797abe31f04d20175a4f2c1",
      "sha1": "a451f22064b0e6e900a3aeaf4f6aa29f7ae3b0c3",
      "md5": "0292ec10e7a05c3e6fe35babf1133371",
      "name": "usbipd",
      "size": 51808,
      "description": null,
      "package": 340937,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T07:42:36+00:00",
      "updated_at": "2021-03-04T07:42:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gke-tools-4.4.0-1027/x86_energy_perf_policy",
      "sha256": "6b437438ee552155561c70f9ae183ec4dcd766282f251eb34dc5912a8f8145e8",
      "sha1": "c4cc6ad3d40799852c192c22d5f8fb0a1eab3785",
      "md5": "ae84e3a5d60e829822d823c79ef86f9e",
      "name": "x86_energy_perf_policy",
      "size": 10440,
      "description": null,
      "package": 340937,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-04T07:42:36+00:00",
      "updated_at": "2021-03-04T07:42:36+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2017-11176",
      "risk": 78,
      "source": "USN",
      "sid": "USN-3470-2",
      "fixed": null,
      "created_at": "2021-03-22T08:30:12+00:00",
      "updated_at": "2021-03-22T08:30:12+00:00"
    },
    {
      "name": "CVE-2017-1000371",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-22T09:18:29+00:00",
      "updated_at": "2021-03-22T09:18:29+00:00"
    },
    {
      "name": "CVE-2017-11089",
      "risk": 75,
      "source": "USN",
      "sid": "USN-3620-2",
      "fixed": null,
      "created_at": "2021-03-22T10:04:33+00:00",
      "updated_at": "2021-03-22T10:04:33+00:00"
    },
    {
      "name": "CVE-2017-18079",
      "risk": 78,
      "source": "USN",
      "sid": "USN-3655-2",
      "fixed": null,
      "created_at": "2021-03-22T10:19:13+00:00",
      "updated_at": "2021-03-22T10:19:13+00:00"
    },
    {
      "name": "CVE-2017-1000370",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-22T11:30:15+00:00",
      "updated_at": "2021-03-22T11:30:15+00:00"
    },
    {
      "name": "CVE-2015-7837",
      "risk": 55,
      "source": "USN",
      "sid": "USN-3405-2",
      "fixed": null,
      "created_at": "2021-03-22T12:20:13+00:00",
      "updated_at": "2021-03-22T12:20:13+00:00"
    },
    {
      "name": "CVE-2017-7495",
      "risk": 55,
      "source": "USN",
      "sid": "USN-3406-2",
      "fixed": null,
      "created_at": "2021-03-22T12:21:16+00:00",
      "updated_at": "2021-03-22T12:21:16+00:00"
    },
    {
      "name": "CVE-2017-12146",
      "risk": 70,
      "source": "USN",
      "sid": "USN-3508-2",
      "fixed": null,
      "created_at": "2021-03-22T12:57:57+00:00",
      "updated_at": "2021-03-22T12:57:57+00:00"
    },
    {
      "name": "CVE-2017-7541",
      "risk": 78,
      "source": "USN",
      "sid": "USN-3422-2",
      "fixed": null,
      "created_at": "2021-03-22T13:02:53+00:00",
      "updated_at": "2021-03-22T13:02:53+00:00"
    },
    {
      "name": "CVE-2017-11473",
      "risk": 78,
      "source": "USN",
      "sid": "USN-3754-1",
      "fixed": null,
      "created_at": "2021-03-22T15:56:23+00:00",
      "updated_at": "2021-03-22T15:56:23+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2017-08-11T13:10:51+00:00",
  "updated_at": "2021-03-04T07:42:36+00:00",
  "deleted_at": null
}