Zercurity data services
  • Summary
  • Applications (8)
  • Packages (0)
  • Vulnerabilities (18)

linux-tools-5.0.0-31

Hashes
Linux kernel version specific tools for version 5.0.0-31 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.0.0-31 on 32 bit x86. You probably want to install linux-tools-5.0.0-31-<flavour>.
  • SHA256: b1f9d891d74a7b33e00d919dab22f4112e7ab4f6a82841047c1d3053eab72c66
  • SHA1: 894a4d85a9bdf719997dccee906c1d61c8aaaa26
  • MD5: a349f41a78be196ab2cd8425350211c9
Information
  • Version: 5.0.0-31.33
  • Filename: linux-tools-5.0.0-31_5.0.0-31.33_i386.deb
  • Size: 18865
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libaudit1 (>= 1:2.2.1), libc6 (>= 2.28), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.0.0-31
/usr/lib/libcpupower.so.5.0.0-31
743760
usbip
/usr/lib/linux-tools-5.0.0-31/usbip
2703360
libperf-jvmti.so
/usr/lib/linux-tools-5.0.0-31/libperf-jvmti.so
1989160
turbostat
/usr/lib/linux-tools-5.0.0-31/turbostat
1632560
cpupower
/usr/lib/linux-tools-5.0.0-31/cpupower
2804360
perf
/usr/lib/linux-tools-5.0.0-31/perf
178621680
usbipd
/usr/lib/linux-tools-5.0.0-31/usbipd
1994880
x86_energy_perf_policy
/usr/lib/linux-tools-5.0.0-31/x86_energy_perf_policy
408240

Vulnerabilities

NameRiskSourceFixed
CVE-2019-1481678USN
linux-libc-dev
5.0.0-32.34
CVE-2019-15505100USN
linux-libc-dev
5.0.0-32.34
CVE-2019-15504100USN
linux-libc-dev
5.0.0-32.34
CVE-2019-1482188USN
linux-libc-dev
5.0.0-32.34
CVE-2019-1481478USN
linux-libc-dev
5.0.0-32.34
CVE-2019-1590256USN
linux-libc-dev
5.0.0-32.34
CVE-2019-1481578USN
linux-libc-dev
5.0.0-32.34
CVE-2019-218178USN
linux-libc-dev
5.0.0-32.34
CVE-2019-1671475USN
linux-libc-dev
5.0.0-32.34
CVE-2019-218178USN
linux-doc
5.0.0-32.34
CVE-2019-1482188USN
linux-doc
5.0.0-32.34
CVE-2019-1481478USN
linux-doc
5.0.0-32.34
CVE-2019-1481578USN
linux-doc
5.0.0-32.34
CVE-2019-1590256USN
linux-doc
5.0.0-32.34
CVE-2019-15505100USN
linux-doc
5.0.0-32.34
CVE-2019-1481678USN
linux-doc
5.0.0-32.34
CVE-2019-1671475USN
linux-doc
5.0.0-32.34
CVE-2019-15504100USN
linux-doc
5.0.0-32.34

Raw Object

{
  "sha256": "b1f9d891d74a7b33e00d919dab22f4112e7ab4f6a82841047c1d3053eab72c66",
  "sha1": "894a4d85a9bdf719997dccee906c1d61c8aaaa26",
  "md5": "a349f41a78be196ab2cd8425350211c9",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-tools-5.0.0-31",
  "filename": "linux-tools-5.0.0-31_5.0.0-31.33_i386.deb",
  "size": 18865,
  "description": "Linux kernel version specific tools for version 5.0.0-31\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.0.0-31 on\n32 bit x86.\nYou probably want to install linux-tools-5.0.0-31-<flavour>.",
  "url": null,
  "version": "5.0.0-31.33",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libaudit1 (>= 1:2.2.1), libc6 (>= 2.28), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.0.0-31",
      "sha256": "f48669d97697f9710e41616f30987c9dbb7eacf006fd5f70583f03eac3b2e333",
      "sha1": "bae4c286ade3cde3f4d8a6384a4b45433e43f141",
      "md5": "3b751823b33981638342a212d61f8e69",
      "name": "libcpupower.so.5.0.0-31",
      "size": 74376,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.0.0-31/usbip",
      "sha256": "4549941bf2554185ff4744be58e6a9cd8ed3eb693524496ea9be8dc936d953af",
      "sha1": "088a53f94a79eedcaf2bbf615f4d07bc7026d754",
      "md5": "b797028aa3e804160f69c1eeabc860a9",
      "name": "usbip",
      "size": 270336,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.0.0-31/libperf-jvmti.so",
      "sha256": "47fac82d8eed5750e0bb42551e57fbfc6e4a7ffba7c61d9151a0ceb795ebacee",
      "sha1": "b244ab3e5d1296e2bcfb4d5b5d8163f9341fd47c",
      "md5": "5881cd5a868ea77219de32324cf13c19",
      "name": "libperf-jvmti.so",
      "size": 198916,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.0.0-31/turbostat",
      "sha256": "63878b72520389b34f3ea9d2db0c6eda3732d912dc3cec53ae7eae95c0ad56cd",
      "sha1": "a0c57b92a0de7da9e687d158c6f2598287a6490f",
      "md5": "0093c3d058ebb13aea7a5d260989c35f",
      "name": "turbostat",
      "size": 163256,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.0.0-31/cpupower",
      "sha256": "d4043fafdc3ebdfc654dfffe5fdcc9c5180e6f2ccf918ded548df3ac7b2c1f2f",
      "sha1": "947dfda4712f28ed5d8140dc821a852384d5f7cc",
      "md5": "eef4d294a5a2fe21198e19c17befbadd",
      "name": "cpupower",
      "size": 280436,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.0.0-31/perf",
      "sha256": "7aeedc90e1517506f911599ad52e9a3fce42a57d82124f27e928d6c573641b3d",
      "sha1": "5925e91a84d25b253cc7623db57ff4d7c49a47ad",
      "md5": "6c8b5d642c2664545e0285205b042ff2",
      "name": "perf",
      "size": 17862168,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.0.0-31/usbipd",
      "sha256": "1a2d7cbab06bf111e2d39923beafa82cd0e2965d53c754d1faeb84a1d0733400",
      "sha1": "34d8ca6678e6c4ead421d28bddf39e01d1d9f4b4",
      "md5": "ce7a234fc738406a2a31b31f85b24a14",
      "name": "usbipd",
      "size": 199488,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-5.0.0-31/x86_energy_perf_policy",
      "sha256": "c6fcba0ce75f5c25954d1b0c66b62bc5c4a7d7b099fe2ff39a149f3e4f06d7cf",
      "sha1": "3e853440764cd94e336252d51ce5cc93f7045480",
      "md5": "51d241d3c65f4cf13e26faf0a63dd392",
      "name": "x86_energy_perf_policy",
      "size": 40824,
      "description": null,
      "package": 2072686,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-21T07:45:38+00:00",
      "updated_at": "2021-03-21T07:45:38+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2019-14816",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-27T06:18:07+00:00",
      "updated_at": "2021-10-27T06:18:07+00:00"
    },
    {
      "name": "CVE-2019-15505",
      "risk": 100,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-27T12:31:57+00:00",
      "updated_at": "2021-10-27T12:31:57+00:00"
    },
    {
      "name": "CVE-2019-15504",
      "risk": 100,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-27T13:25:57+00:00",
      "updated_at": "2021-10-27T13:25:57+00:00"
    },
    {
      "name": "CVE-2019-14821",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-27T21:35:37+00:00",
      "updated_at": "2021-10-27T21:35:37+00:00"
    },
    {
      "name": "CVE-2019-14814",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-28T01:00:19+00:00",
      "updated_at": "2021-10-28T01:00:19+00:00"
    },
    {
      "name": "CVE-2019-15902",
      "risk": 56,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-28T01:13:25+00:00",
      "updated_at": "2021-10-28T01:13:25+00:00"
    },
    {
      "name": "CVE-2019-14815",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-28T03:46:02+00:00",
      "updated_at": "2021-10-28T03:46:02+00:00"
    },
    {
      "name": "CVE-2019-2181",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-28T10:52:56+00:00",
      "updated_at": "2021-10-28T10:52:56+00:00"
    },
    {
      "name": "CVE-2019-16714",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "1b62d34a708da2ddadb21e9a88a64849868d14958aa7c91caf588bae213f96c3",
        "name": "linux-libc-dev",
        "version": "5.0.0-32.34",
        "filename": "linux-libc-dev_5.0.0-32.34_i386.deb"
      },
      "created_at": "2021-10-28T11:10:02+00:00",
      "updated_at": "2021-10-28T11:10:02+00:00"
    },
    {
      "name": "CVE-2019-2181",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-28T14:07:11+00:00",
      "updated_at": "2021-10-28T14:07:11+00:00"
    },
    {
      "name": "CVE-2019-14821",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-28T15:08:46+00:00",
      "updated_at": "2021-10-28T15:08:46+00:00"
    },
    {
      "name": "CVE-2019-14814",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-28T16:36:11+00:00",
      "updated_at": "2021-10-28T16:36:11+00:00"
    },
    {
      "name": "CVE-2019-14815",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-29T01:22:18+00:00",
      "updated_at": "2021-10-29T01:22:18+00:00"
    },
    {
      "name": "CVE-2019-15902",
      "risk": 56,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-29T06:14:56+00:00",
      "updated_at": "2021-10-29T06:14:56+00:00"
    },
    {
      "name": "CVE-2019-15505",
      "risk": 100,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-29T17:18:31+00:00",
      "updated_at": "2021-10-29T17:18:31+00:00"
    },
    {
      "name": "CVE-2019-14816",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-30T05:05:08+00:00",
      "updated_at": "2021-10-30T05:05:08+00:00"
    },
    {
      "name": "CVE-2019-16714",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-30T08:04:27+00:00",
      "updated_at": "2021-10-30T08:04:27+00:00"
    },
    {
      "name": "CVE-2019-15504",
      "risk": 100,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f72d59b3b57372cae1416488672b36e5afca770d80a12ec227ed306cfd2a3a30",
        "name": "linux-doc",
        "version": "5.0.0-32.34",
        "filename": "linux-doc_5.0.0-32.34_all.deb"
      },
      "created_at": "2021-10-30T11:27:10+00:00",
      "updated_at": "2021-10-30T11:27:10+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2019-09-30T21:08:52+00:00",
  "updated_at": "2021-03-21T07:45:37+00:00",
  "deleted_at": null
}