b12ef87a091d7e52a01ffba6900f1d3a158959fc4d998822f4f07d9e39304ebb
aebb9d701a634a109e9b1ef07afabde702885bc8
afc942c141133ebbd0f38a19f387381a
5.4.0-1086.92
linux-kvm-tools-5.4.0-1086_5.4.0-1086.92_amd64.deb
23836
DEB
linux-kvm
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1086 /usr/lib/libcpupower.so.5.4.0-1086 | 97800 | 0 | ||
usbip /usr/lib/linux-kvm-tools-5.4.0-1086/usbip | 300504 | 0 | ||
turbostat /usr/lib/linux-kvm-tools-5.4.0-1086/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-kvm-tools-5.4.0-1086/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-kvm-tools-5.4.0-1086/perf | 21831280 | 0 | ||
bpftool /usr/lib/linux-kvm-tools-5.4.0-1086/bpftool | 551712 | 0 | ||
usbipd /usr/lib/linux-kvm-tools-5.4.0-1086/usbipd | 297120 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-kvm-tools-5.4.0-1086/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-0045 | 0 | USN | |
CVE-2022-3435 | 43 | USN | |
CVE-2022-47929 | 6 | USN | |
CVE-2023-0461 | 0 | USN | |
CVE-2022-3521 | 25 | USN | |
CVE-2022-42329 | 6 | USN | |
CVE-2022-4139 | 0 | USN | |
CVE-2022-47520 | 7 | USN | |
CVE-2022-36280 | 55 | USN | |
CVE-2022-3169 | 55 | USN | |
CVE-2022-3424 | 8 | USN | |
CVE-2023-20938 | 8 | USN | |
CVE-2023-0266 | 8 | USN | |
CVE-2022-3623 | 8 | USN | |
CVE-2023-0394 | 6 | USN | |
CVE-2023-23455 | 0 | USN | |
CVE-2022-3545 | 78 | USN | |
CVE-2022-42328 | 6 | USN | |
CVE-2022-41218 | 55 | USN | |
CVE-2023-23454 | 0 | USN | |
CVE-2023-28328 | 0 | USN | |
CVE-2023-26607 | 7 | USN | |
CVE-2023-1382 | 0 | USN | |
CVE-2023-2166 | 0 | USN |
{ "sha256": "b12ef87a091d7e52a01ffba6900f1d3a158959fc4d998822f4f07d9e39304ebb", "sha1": "aebb9d701a634a109e9b1ef07afabde702885bc8", "md5": "afc942c141133ebbd0f38a19f387381a", "type": "DEB", "arch": "AMD64", "name": "linux-kvm-tools-5.4.0-1086", "filename": "linux-kvm-tools-5.4.0-1086_5.4.0-1086.92_amd64.deb", "size": 23836, "description": "Linux kernel version specific tools for version 5.4.0-1086\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1086 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1086-<flavour>.", "url": null, "version": "5.4.0-1086.92", "source": "linux-kvm", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1086", "sha256": "50b9e116e6a7ca8443f698298fed9fe0f44191140d47a3190929dffc7d87fd26", "sha1": "04cd1e495813cfaf65cc25e9764e102f4cefe1d3", "md5": "05d84e3a46a6f42bcddba92d7a37ea88", "name": "libcpupower.so.5.4.0-1086", "size": 97800, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.4.0-1086/usbip", "sha256": "c0187e1d258808441054b74527674f0fd1dfadac4f2cf846d045c7318bbaadc3", "sha1": "9a07a84c4ad8851f605387cc503adc6f9c337164", "md5": "c4227887bdd4a65781b27f79bf79182d", "name": "usbip", "size": 300504, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.4.0-1086/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.4.0-1086/cpupower", "sha256": "53268ced718acd112bcc24546d2c6d537af46f41bb5d4874062d7026bcf734eb", "sha1": "1fedde81977f0cde9241fdc70c0f1ce631f96337", "md5": "a9751ed15e001570e93a941376e39816", "name": "cpupower", "size": 337952, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.4.0-1086/perf", "sha256": "fcb52bb7644537515a6ff4e83bc5ff0709925f82688e43c46e4f89b859b9da39", "sha1": "fbb44cf4ffdb6a9862f4737b92eba7dacfec127e", "md5": "10a2dc01890f31a7eb37c517422046f0", "name": "perf", "size": 21831280, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.4.0-1086/bpftool", "sha256": "370f3b1a8c7a296d2a9a27c49925bfe6d4b15aba39d72676d4880064e5d41f13", "sha1": "c3f7501dd32176d6c5b4b07cedf872c222bdb0da", "md5": "b16219d9aa64939a5e8a7e65dca911ee", "name": "bpftool", "size": 551712, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.4.0-1086/usbipd", "sha256": "c6136732b60105906ab028a679487282928b162f09ef56b067993305f59e5aab", "sha1": "535d25e441cdf0932a337c60024db0b7b4fefe68", "md5": "d51cfd9f53e9c2654613378668408fcf", "name": "usbipd", "size": 297120, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-kvm-tools-5.4.0-1086/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 5133995, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T11:49:25+00:00", "updated_at": "2023-02-11T11:49:25+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2023-0045", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:38:30+00:00", "updated_at": "2023-03-04T10:38:30+00:00" }, { "name": "CVE-2022-3435", "risk": 43, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:41:09+00:00", "updated_at": "2023-03-04T10:41:09+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:41:46+00:00", "updated_at": "2023-03-04T10:41:46+00:00" }, { "name": "CVE-2023-0461", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:44:45+00:00", "updated_at": "2023-03-04T10:44:45+00:00" }, { "name": "CVE-2022-3521", "risk": 25, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:46:52+00:00", "updated_at": "2023-03-04T10:46:52+00:00" }, { "name": "CVE-2022-42329", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:47:02+00:00", "updated_at": "2023-03-04T10:47:02+00:00" }, { "name": "CVE-2022-4139", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:47:09+00:00", "updated_at": "2023-03-04T10:47:09+00:00" }, { "name": "CVE-2022-47520", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:48:10+00:00", "updated_at": "2023-03-04T10:48:10+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:48:18+00:00", "updated_at": "2023-03-04T10:48:18+00:00" }, { "name": "CVE-2022-3169", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:48:24+00:00", "updated_at": "2023-03-04T10:48:24+00:00" }, { "name": "CVE-2022-3424", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:48:46+00:00", "updated_at": "2023-03-04T10:48:46+00:00" }, { "name": "CVE-2023-20938", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:49:06+00:00", "updated_at": "2023-03-04T10:49:06+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:59:07+00:00", "updated_at": "2023-03-04T10:59:07+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T10:59:36+00:00", "updated_at": "2023-03-04T10:59:36+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T11:10:53+00:00", "updated_at": "2023-03-04T11:10:53+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T11:10:58+00:00", "updated_at": "2023-03-04T11:10:58+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T11:11:08+00:00", "updated_at": "2023-03-04T11:11:08+00:00" }, { "name": "CVE-2022-42328", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T11:12:52+00:00", "updated_at": "2023-03-04T11:12:52+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T11:13:26+00:00", "updated_at": "2023-03-04T11:13:26+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-04T11:13:30+00:00", "updated_at": "2023-03-04T11:13:30+00:00" }, { "name": "CVE-2023-28328", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:24:40+00:00", "updated_at": "2023-04-21T09:24:40+00:00" }, { "name": "CVE-2023-26607", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:25:11+00:00", "updated_at": "2023-04-21T09:25:11+00:00" }, { "name": "CVE-2023-1382", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:29:27+00:00", "updated_at": "2023-04-21T09:29:27+00:00" }, { "name": "CVE-2023-2166", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-06T10:07:04+00:00", "updated_at": "2023-06-06T10:07:04+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-01-25T18:13:31+00:00", "updated_at": "2023-02-11T11:49:24+00:00", "deleted_at": null }