9db530ce8a7e5e5fdc0723e013d4569542922d91dcd0b5ad19f73da32793bd35
cd8e950cbb75f6deb6cad7a2358034c0b685e2d9
615994d020289dbb7b9af9507b9bb634
5.17.0-1015.16
linux-oem-5.17-tools-5.17.0-1015_5.17.0-1015.16_amd64.deb
26332
DEB
linux-oem-5.17
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.17.0-1015 /usr/lib/libcpupower.so.5.17.0-1015 | 81792 | 0 | ||
usbip /usr/lib/linux-oem-5.17-tools-5.17.0-1015/usbip | 248952 | 0 | ||
libperf-jvmti.so /usr/lib/linux-oem-5.17-tools-5.17.0-1015/libperf-jvmti.so | 216000 | 0 | ||
turbostat /usr/lib/linux-oem-5.17-tools-5.17.0-1015/turbostat | 143536 | 0 | ||
cpupower /usr/lib/linux-oem-5.17-tools-5.17.0-1015/cpupower | 294424 | 0 | ||
perf /usr/lib/linux-oem-5.17-tools-5.17.0-1015/perf | 22709744 | 0 | ||
acpidbg /usr/lib/linux-oem-5.17-tools-5.17.0-1015/acpidbg | 934280 | 0 | ||
bpftool /usr/lib/linux-oem-5.17-tools-5.17.0-1015/bpftool | 1709680 | 0 | ||
usbipd /usr/lib/linux-oem-5.17-tools-5.17.0-1015/usbipd | 249352 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-5.17-tools-5.17.0-1015/x86_energy_perf_policy | 46608 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33061 | 55 | USN | linux-oem-5.17-tools-host 5.17.0-1016.17 |
CVE-2021-33655 | 78 | USN | linux-oem-5.17-tools-host 5.17.0-1016.17 |
CVE-2021-33655 | 78 | USN | |
CVE-2022-42720 | 78 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-42719 | 88 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-42721 | 55 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-3028 | 70 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-41674 | 81 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-42722 | 55 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-2318 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-2978 | 78 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-40768 | 55 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
CVE-2022-2602 | 0 | USN | linux-oem-5.17-tools-host 5.17.0-1020.21 |
{ "sha256": "9db530ce8a7e5e5fdc0723e013d4569542922d91dcd0b5ad19f73da32793bd35", "sha1": "cd8e950cbb75f6deb6cad7a2358034c0b685e2d9", "md5": "615994d020289dbb7b9af9507b9bb634", "type": "DEB", "arch": "AMD64", "name": "linux-oem-5.17-tools-5.17.0-1015", "filename": "linux-oem-5.17-tools-5.17.0-1015_5.17.0-1015.16_amd64.deb", "size": 26332, "description": "Linux kernel version specific tools for version 5.17.0-1015\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.17.0-1015 on\n64 bit x86.\nYou probably want to install linux-tools-5.17.0-1015-<flavour>.", "url": null, "version": "5.17.0-1015.16", "source": "linux-oem-5.17", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.17.0-1015", "sha256": "18ea08b91d9b7fd792c2e21f19c066105deead70d819dcaa1bc916f9340ed238", "sha1": "456fb358481f6322bb23b2dc74acc05a97ff635b", "md5": "62cf0a13ed6864bd3ef9bcede0d06be0", "name": "libcpupower.so.5.17.0-1015", "size": 81792, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/usbip", "sha256": "68e3da231c08d29673350dc3063d4c5bf3688e29b7766bdb677316ebb176aa6c", "sha1": "c02f38fb01caa6b4c7bcf862e6137429d638e442", "md5": "785db44182c00734de4acd7297ec416c", "name": "usbip", "size": 248952, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/libperf-jvmti.so", "sha256": "65d822c8257572eb6cde5b45cd9cb61d77781f06737ea721d818cbc446b17032", "sha1": "c4e5e68ebf031385e1c09100ac4b21ce16d1ccd3", "md5": "07c83086bbd3ead078d86f96f326e615", "name": "libperf-jvmti.so", "size": 216000, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/turbostat", "sha256": "9753c6d5a698ca32d210bdf690bb3d6791e1f4c9d6aab6d3cab6b215b393d18d", "sha1": "2a374a4495555ca116c06f31cddcf86937823c5a", "md5": "35979b31644f93bded1e86b15de39061", "name": "turbostat", "size": 143536, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/cpupower", "sha256": "1ca84d309de2b64cecfe512e3d40cc05cdb9267da5c165642cdd091912642841", "sha1": "70dd41356bd5e33ae9c896a00a5786b30c7768e1", "md5": "29ad165adbea132dc238df4d387a9a46", "name": "cpupower", "size": 294424, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/perf", "sha256": "da81821a1b33dec7986b73da47da52f0d5772ed059e08a7635f3e7534ed74198", "sha1": "c2e0818a672c1118480037309ba7a827f3998737", "md5": "39c84d1217b34d6cf8fc1d5aeef0a76d", "name": "perf", "size": 22709744, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/acpidbg", "sha256": "8a00e097057912dc56afcfa88376d7940e9a3c0ad9eadc1047754a268cac874f", "sha1": "8733e798865dc4a4be5082ca565bfd893a9a0c92", "md5": "81d705fdf05ccf7f82ce4d5375b0534d", "name": "acpidbg", "size": 934280, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/bpftool", "sha256": "03a5a8061a1e8b1d718c4bf7100712f7096af0c6fb4f737e6e1ba5fccd14cb18", "sha1": "a3abd398f24d969f76c3c7c4889e2b8088169dc6", "md5": "449f373e5176c09aca164d2508e18b2c", "name": "bpftool", "size": 1709680, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/usbipd", "sha256": "0e643d0031d7b66fa015aaebd3eda1620782fe9afa19acea45ed4f68d3c3381c", "sha1": "e7ce5750185c878b029643bc9156cc99af5a8f87", "md5": "726dce31deae343684ca628fb2c3f5ed", "name": "usbipd", "size": 249352, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1015/x86_energy_perf_policy", "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543", "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b", "md5": "b22454323232ae918c7ea0cc55df6557", "name": "x86_energy_perf_policy", "size": 46608, "description": null, "package": 3904356, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:02:38+00:00", "updated_at": "2022-08-10T04:02:38+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a8c4f767a0c1c8247a4d01a7653f5d46619bce948b1a0e4047f760779fd5deb5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1016.17", "filename": "linux-oem-5.17-tools-host_5.17.0-1016.17_all.deb" }, "created_at": "2022-09-16T16:21:43+00:00", "updated_at": "2022-09-16T16:21:43+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "a8c4f767a0c1c8247a4d01a7653f5d46619bce948b1a0e4047f760779fd5deb5", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1016.17", "filename": "linux-oem-5.17-tools-host_5.17.0-1016.17_all.deb" }, "created_at": "2022-09-16T16:58:32+00:00", "updated_at": "2022-09-16T16:58:32+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-09-30T17:29:46+00:00", "updated_at": "2022-09-30T17:29:46+00:00" }, { "name": "CVE-2022-42720", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T17:22:29+00:00", "updated_at": "2022-10-20T17:22:29+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T17:25:09+00:00", "updated_at": "2022-10-20T17:25:09+00:00" }, { "name": "CVE-2022-42721", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T18:10:49+00:00", "updated_at": "2022-10-20T18:10:49+00:00" }, { "name": "CVE-2022-3028", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T18:16:12+00:00", "updated_at": "2022-10-20T18:16:12+00:00" }, { "name": "CVE-2022-41674", "risk": 81, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T18:33:27+00:00", "updated_at": "2022-10-20T18:33:27+00:00" }, { "name": "CVE-2022-42722", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T18:46:27+00:00", "updated_at": "2022-10-20T18:46:27+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T19:07:50+00:00", "updated_at": "2022-10-20T19:07:50+00:00" }, { "name": "CVE-2022-2978", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T19:17:23+00:00", "updated_at": "2022-10-20T19:17:23+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T19:21:10+00:00", "updated_at": "2022-10-20T19:21:10+00:00" }, { "name": "CVE-2022-2602", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8c81c887626a9872786c65bf51a853ba81b766e50691b2565518a1dcd0965387", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1020.21", "filename": "linux-oem-5.17-tools-host_5.17.0-1020.21_all.deb" }, "created_at": "2022-10-20T19:23:49+00:00", "updated_at": "2022-10-20T19:23:49+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-08-08T20:30:09+00:00", "updated_at": "2022-08-10T03:02:37+00:00", "deleted_at": null }