98e2d1d7fae2b1eebc519b98f3bc6ac48940f43ad33ed310590442259e4a64a3
534b97ce98632d9e52e6f897f997b4b1f0e747e2
f2e9cdca3d1ccfad4b7a6d67260cdc73
5.15.0-58.64
linux-tools-5.15.0-58_5.15.0-58.64_amd64.deb
25993
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.15.0-58 /usr/lib/libcpupower.so.5.15.0-58 | 81776 | 0 | ||
usbip /usr/lib/linux-tools-5.15.0-58/usbip | 248920 | 0 | ||
libperf-jvmti.so /usr/lib/linux-tools-5.15.0-58/libperf-jvmti.so | 215888 | 0 | ||
turbostat /usr/lib/linux-tools-5.15.0-58/turbostat | 143544 | 0 | ||
cpupower /usr/lib/linux-tools-5.15.0-58/cpupower | 294416 | 0 | ||
perf /usr/lib/linux-tools-5.15.0-58/perf | 22355888 | 0 | ||
acpidbg /usr/lib/linux-tools-5.15.0-58/acpidbg | 934264 | 0 | ||
bpftool /usr/lib/linux-tools-5.15.0-58/bpftool | 1591976 | 0 | ||
usbipd /usr/lib/linux-tools-5.15.0-58/usbipd | 249320 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-tools-5.15.0-58/x86_energy_perf_policy | 46616 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3543 | 55 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3623 | 8 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3640 | 9 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-42895 | 6 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-0590 | 5 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3619 | 43 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-41850 | 47 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-47940 | 8 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-41849 | 42 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-22998 | 6 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-1872 | 7 | USN | linux-source-5.15.0 5.15.0-71.78 |
CVE-2023-1829 | 8 | USN | linux-source-5.15.0 5.15.0-71.78 |
CVE-2022-1184 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-3006 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-3812 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
{ "sha256": "98e2d1d7fae2b1eebc519b98f3bc6ac48940f43ad33ed310590442259e4a64a3", "sha1": "534b97ce98632d9e52e6f897f997b4b1f0e747e2", "md5": "f2e9cdca3d1ccfad4b7a6d67260cdc73", "type": "DEB", "arch": "AMD64", "name": "linux-tools-5.15.0-58", "filename": "linux-tools-5.15.0-58_5.15.0-58.64_amd64.deb", "size": 25993, "description": "Linux kernel version specific tools for version 5.15.0-58\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-58 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-58-<flavour>.", "url": null, "version": "5.15.0-58.64", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.15.0-58", "sha256": "bf579d9021dfc65ddc70f712cfc21188b07b1d6f7de70629a9fcbdc969df28c5", "sha1": "cdf3a7ff1defdddc7f66b10ba93d44055c45df7d", "md5": "728db7af77ce609b0593c4959cde264b", "name": "libcpupower.so.5.15.0-58", "size": 81776, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/usbip", "sha256": "61f633fa9bc30be934d977a4c2d346a848d3abcc9ede6e53941578a9b5be3697", "sha1": "ce853d25e0bff08bc71b0b41acee34c3645da170", "md5": "754421749a2a55513963dda625a1b722", "name": "usbip", "size": 248920, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/libperf-jvmti.so", "sha256": "80d1a006297a214b4dd724ab9e874a4c487e8aad7eabe744a2ef7463876a43a8", "sha1": "41e1593313b0af51e5a3dbb998fb0dc1690b5930", "md5": "7e5f9f4a6169b9fb940c6a4ce3838f66", "name": "libperf-jvmti.so", "size": 215888, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/turbostat", "sha256": "11f39965019c0ad6d8e43a6ce02749543eb26cc68164f58ee797a89886d64d20", "sha1": "c810d09463f3c1cd49656662d11f98c6463644fa", "md5": "8f51926061fb7ebc823f4dec3fbf810d", "name": "turbostat", "size": 143544, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/cpupower", "sha256": "346f8662126907ac43ef077e1c4f00e0206b672e7711d02d1490cf4c72f09d65", "sha1": "1ba2cf0f570deb79f7c40c6274120875111163fc", "md5": "f8f853fccc0b8c358448e3f22564654f", "name": "cpupower", "size": 294416, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/perf", "sha256": "4d871171e794a4d46679823dbf9a120c5f66c51baa2fd4657c4d771d0a4e2a49", "sha1": "5c845cc9fd0d44ffd8a8be4a2e88e5f9e937942f", "md5": "34437ea5c0f6e65ebeeba423e6a178a9", "name": "perf", "size": 22355888, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/acpidbg", "sha256": "61d96e5867043030adfcfb87138fd05b87a6cfcc105ddd3e3e7e78cb5fc70764", "sha1": "08594565e06a9bb4aea9f0001041e56af5ba3e2d", "md5": "fda8e106b65cab005a2bf2fc2ea7718c", "name": "acpidbg", "size": 934264, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/bpftool", "sha256": "a5a1c1d80dac1a476b2adb56adbfdef7c1b40b310822ea796d13c3e0a3c946e3", "sha1": "4c45b07ab27136b9f8d9b8ae54a77f292bef8bef", "md5": "92ef8f33f2173ea86989469a833811ee", "name": "bpftool", "size": 1591976, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/usbipd", "sha256": "48a62721bca5c53bede697d8a2a0d53c890fbf114738e894d43fe3767ec0d685", "sha1": "c15c3fbec3a85d6438914e79198e82e9fdf36d70", "md5": "13abb6ed1da1ddbd92e28b6f3e172fcc", "name": "usbipd", "size": 249320, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-58/x86_energy_perf_policy", "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643", "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5", "md5": "e9d52e1dde799b718aef361de0e9b299", "name": "x86_energy_perf_policy", "size": 46616, "description": null, "package": 5052861, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:30+00:00", "updated_at": "2023-01-14T10:14:30+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:16:51+00:00", "updated_at": "2023-02-10T10:16:51+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:22:52+00:00", "updated_at": "2023-02-10T10:22:52+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:27:52+00:00", "updated_at": "2023-02-10T10:27:52+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:30:09+00:00", "updated_at": "2023-02-10T10:30:09+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:31:28+00:00", "updated_at": "2023-02-10T10:31:28+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:50+00:00", "updated_at": "2023-02-10T10:32:50+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:58+00:00", "updated_at": "2023-02-10T10:32:58+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:34:59+00:00", "updated_at": "2023-02-10T10:34:59+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:39:33+00:00", "updated_at": "2023-02-10T10:39:33+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:41:15+00:00", "updated_at": "2023-02-10T10:41:15+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-04-21T09:28:50+00:00", "updated_at": "2023-04-21T09:28:50+00:00" }, { "name": "CVE-2023-1872", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "71a6189c5ad1f5ee6b76759abae96a7ada4b68292f84eaaf4a6abf44b70726e1", "name": "linux-source-5.15.0", "version": "5.15.0-71.78", "filename": "linux-source-5.15.0_5.15.0-71.78_all.deb" }, "created_at": "2023-04-28T22:46:10+00:00", "updated_at": "2023-04-28T22:46:10+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "71a6189c5ad1f5ee6b76759abae96a7ada4b68292f84eaaf4a6abf44b70726e1", "name": "linux-source-5.15.0", "version": "5.15.0-71.78", "filename": "linux-source-5.15.0_5.15.0-71.78_all.deb" }, "created_at": "2023-04-29T07:29:12+00:00", "updated_at": "2023-04-29T07:29:12+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-06-06T10:06:15+00:00", "updated_at": "2023-06-06T10:06:15+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-07-12T10:06:59+00:00", "updated_at": "2023-07-12T10:06:59+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-08-09T09:33:01+00:00", "updated_at": "2023-08-09T09:33:01+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-05T13:03:23+00:00", "updated_at": "2023-01-14T10:14:29+00:00", "deleted_at": null }