b3c6ab78b50ee363369ab073fd5c7a706b73415e4196ec57e2e76838b1f721ad
073221798a589883c2a633b9be9bed49f41ffbf5
68715c3b0bc26725ee701151e35c5ba9
5.4.0-1083.91
linux-gcp-tools-5.4.0-1083_5.4.0-1083.91_amd64.deb
23711
DEB
linux-gcp
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1083 /usr/lib/libcpupower.so.5.4.0-1083 | 97800 | 0 | ||
usbip /usr/lib/linux-gcp-tools-5.4.0-1083/usbip | 300504 | 0 | ||
turbostat /usr/lib/linux-gcp-tools-5.4.0-1083/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gcp-tools-5.4.0-1083/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gcp-tools-5.4.0-1083/perf | 21824048 | 0 | ||
bpftool /usr/lib/linux-gcp-tools-5.4.0-1083/bpftool | 551648 | 0 | ||
usbipd /usr/lib/linux-gcp-tools-5.4.0-1083/usbipd | 297120 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gcp-tools-5.4.0-1083/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-1204 | 55 | USN | |
CVE-2022-1199 | 0 | USN | |
CVE-2022-1195 | 0 | USN | |
CVE-2022-33981 | 0 | USN | |
CVE-2022-1205 | 47 | USN | |
CVE-2022-1789 | 0 | USN | |
CVE-2022-28388 | 78 | USN | |
CVE-2022-41858 | 7 | USN | |
CVE-2022-2639 | 78 | USN | |
CVE-2022-2991 | 67 | USN |
{ "sha256": "b3c6ab78b50ee363369ab073fd5c7a706b73415e4196ec57e2e76838b1f721ad", "sha1": "073221798a589883c2a633b9be9bed49f41ffbf5", "md5": "68715c3b0bc26725ee701151e35c5ba9", "type": "DEB", "arch": "AMD64", "name": "linux-gcp-tools-5.4.0-1083", "filename": "linux-gcp-tools-5.4.0-1083_5.4.0-1083.91_amd64.deb", "size": 23711, "description": "Linux kernel version specific tools for version 5.4.0-1083\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1083 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1083-<flavour>.", "url": null, "version": "5.4.0-1083.91", "source": "linux-gcp", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1083", "sha256": "e8f139db239985f302104f46dcfc564ea535deb40268df24b2a6b517b4c0b256", "sha1": "fcde282251b064938ca10e2e4b7d633da5091c6c", "md5": "a0c9d10f0f986bc31462afbbfaa1c474", "name": "libcpupower.so.5.4.0-1083", "size": 97800, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.4.0-1083/usbip", "sha256": "4df10df5f8f34940c0d6a48fb07cd3d0bf88b3c62ae017de5334d3c4622b59f3", "sha1": "a22cf03671d2a32a52e820b6e3bd2a0b50d9a20c", "md5": "afac57d6817663e09d8ccdfa71e5e254", "name": "usbip", "size": 300504, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.4.0-1083/turbostat", "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785", "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846", "md5": "3dca491f8622de5e10e9125e01b85e3e", "name": "turbostat", "size": 134424, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.4.0-1083/cpupower", "sha256": "97922f33ced3af544af8ae81283ae042a15f6695c871605e2064ae1ed831937b", "sha1": "ff485669ec3f9db02c0ca6c90f6337417f7e88e7", "md5": "4d1d46a8ed678267f4f97f2e6623acf1", "name": "cpupower", "size": 337952, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.4.0-1083/perf", "sha256": "fd43f825714cb4cb6be2ddaa812c2fa93267724ef35c371320f2690c426fc4b0", "sha1": "bab51943f9727ea445f3c9e8676036cc90c4bf29", "md5": "224bf0d7bcb6796512527ea72eac1ddd", "name": "perf", "size": 21824048, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.4.0-1083/bpftool", "sha256": "f4c876fb01ca6d36870af6e71e4d8b8bdf501c5158946dfbc54e25106d3a7815", "sha1": "cf8941f4de166459af9226fa0525105ba537e578", "md5": "227c2825be0b6c0bc7dc5084b3becc0a", "name": "bpftool", "size": 551648, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.4.0-1083/usbipd", "sha256": "95e4b3068ad01823ae2ccf25c06ee06b11fdabf58ae42a7603926f00a9e02e0a", "sha1": "28ce3d62a5d6b7fee69fcbc65364a2b47eefd2f5", "md5": "bbbebf59348fba8fb0152b5e4c14323c", "name": "usbipd", "size": 297120, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gcp-tools-5.4.0-1083/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3833702, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-09T02:37:56+00:00", "updated_at": "2022-07-09T02:37:56+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-1204", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-22T02:54:39+00:00", "updated_at": "2022-07-22T02:54:39+00:00" }, { "name": "CVE-2022-1199", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-22T03:12:23+00:00", "updated_at": "2022-07-22T03:12:23+00:00" }, { "name": "CVE-2022-1195", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-22T04:40:21+00:00", "updated_at": "2022-07-22T04:40:21+00:00" }, { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-22T05:18:10+00:00", "updated_at": "2022-07-22T05:18:10+00:00" }, { "name": "CVE-2022-1205", "risk": 47, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-22T06:09:04+00:00", "updated_at": "2022-07-22T06:09:04+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-22T07:50:04+00:00", "updated_at": "2022-07-22T07:50:04+00:00" }, { "name": "CVE-2022-28388", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-14T02:21:40+00:00", "updated_at": "2022-08-14T02:21:40+00:00" }, { "name": "CVE-2022-41858", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:07:53+00:00", "updated_at": "2023-02-15T11:07:53+00:00" }, { "name": "CVE-2022-2639", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:23:08+00:00", "updated_at": "2023-02-15T11:23:08+00:00" }, { "name": "CVE-2022-2991", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:38:54+00:00", "updated_at": "2023-04-21T09:38:54+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-08T16:19:04+00:00", "updated_at": "2022-07-09T01:37:55+00:00", "deleted_at": null }