b83aefd7ec5f8955b4b78b3fdcace7a47769e716e87207847593d8c540a0b24a
e5b6ecae8ae3ba31bbb540341a15c1e3b1631d2f
c98a0fc223ff37cf56265c38f99cf053
5.4.0-1102.109
linux-gke-tools-5.4.0-1102_5.4.0-1102.109_amd64.deb
23414
DEB
linux-gke
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1102 /usr/lib/libcpupower.so.5.4.0-1102 | 97800 | 0 | ||
usbip /usr/lib/linux-gke-tools-5.4.0-1102/usbip | 300504 | 0 | ||
turbostat /usr/lib/linux-gke-tools-5.4.0-1102/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gke-tools-5.4.0-1102/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gke-tools-5.4.0-1102/perf | 21840544 | 0 | ||
bpftool /usr/lib/linux-gke-tools-5.4.0-1102/bpftool | 552640 | 0 | ||
usbipd /usr/lib/linux-gke-tools-5.4.0-1102/usbipd | 297120 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gke-tools-5.4.0-1102/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-28466 | 7 | USN | |
CVE-2023-0590 | 5 | USN | |
CVE-2023-30772 | 0 | USN | |
CVE-2022-4269 | 6 | USN | |
CVE-2022-0168 | 44 | USN | |
CVE-2022-27672 | 0 | USN | |
CVE-2023-33203 | 0 | USN | |
CVE-2023-2124 | 0 | USN | |
CVE-2023-1990 | 5 | USN | |
CVE-2020-36691 | 6 | USN | |
CVE-2023-1855 | 6 | USN | |
CVE-2023-3141 | 7 | USN | |
CVE-2023-3111 | 8 | USN | |
CVE-2023-1611 | 6 | USN | |
CVE-2022-1184 | 0 | USN | |
CVE-2023-2194 | 7 | USN |
{ "sha256": "b83aefd7ec5f8955b4b78b3fdcace7a47769e716e87207847593d8c540a0b24a", "sha1": "e5b6ecae8ae3ba31bbb540341a15c1e3b1631d2f", "md5": "c98a0fc223ff37cf56265c38f99cf053", "type": "DEB", "arch": "AMD64", "name": "linux-gke-tools-5.4.0-1102", "filename": "linux-gke-tools-5.4.0-1102_5.4.0-1102.109_amd64.deb", "size": 23414, "description": "Linux kernel version specific tools for version 5.4.0-1102\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1102 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1102-<flavour>.", "url": null, "version": "5.4.0-1102.109", "source": "linux-gke", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1102", "sha256": "a7bff329917b1076a763db8852f94276956981b4b311d35937eb7057c475682b", "sha1": "39b196abc09b39f2d5859fc7b16346434ce19d74", "md5": "2435f22526d30b328b2a42c783f2b9d4", "name": "libcpupower.so.5.4.0-1102", "size": 97800, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1102/usbip", "sha256": "675954abd9918015ce8b6ef039084623339667ba2a764d986ba47e86a20ca09e", "sha1": "64787860babc61794a90a0305729f262b2392c4e", "md5": "744edf32392012f4fbad41b57b85beac", "name": "usbip", "size": 300504, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1102/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1102/cpupower", "sha256": "aa3bf883e4d450e2c732b80ca1831a2e7cd8fb4b3ba1bda7896105b97a5b3119", "sha1": "58a232f80ebe0ebb3b1df5e0d1ea59179413fced", "md5": "b9a42581ebc616a8e1fce3a21aa46ae9", "name": "cpupower", "size": 337952, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1102/perf", "sha256": "976d33d4afb88f3c860563f8dbdcc43ddf84b34f81a6f5ce13bbf58f4c6e49ef", "sha1": "369b8d4a0fcd92b2653eed3fef187921e5a66880", "md5": "c70cdc6d10da4bd757cd6427a201cb44", "name": "perf", "size": 21840544, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1102/bpftool", "sha256": "2eef6ef6541d15d427ed790dafb13d9bab274b8f2554be7f521d340b6a49a989", "sha1": "3ce93422024a23a6f48c927a54a1255b73b83d40", "md5": "7c55ae3543ce5f063c3f71f4c23f63b9", "name": "bpftool", "size": 552640, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1102/usbipd", "sha256": "8c9f5b733f03724cec066b0b444e4d391f614c0308af1696dbec33862d5f4c35", "sha1": "a6ed9c20985ea98b764b0a44e64e1e91081116fa", "md5": "6f93e6042ed61673484cefe8c8827243", "name": "usbipd", "size": 297120, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1102/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 5316934, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-06-15T12:09:12+00:00", "updated_at": "2023-06-15T12:09:12+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2023-28466", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:20:43+00:00", "updated_at": "2023-08-29T09:20:43+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:22:55+00:00", "updated_at": "2023-08-29T09:22:55+00:00" }, { "name": "CVE-2023-30772", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:04+00:00", "updated_at": "2023-08-29T09:23:04+00:00" }, { "name": "CVE-2022-4269", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:10+00:00", "updated_at": "2023-08-29T09:23:10+00:00" }, { "name": "CVE-2022-0168", "risk": 44, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:18+00:00", "updated_at": "2023-08-29T09:23:18+00:00" }, { "name": "CVE-2022-27672", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:30+00:00", "updated_at": "2023-08-29T09:23:30+00:00" }, { "name": "CVE-2023-33203", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:37+00:00", "updated_at": "2023-08-29T09:23:37+00:00" }, { "name": "CVE-2023-2124", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:44+00:00", "updated_at": "2023-08-29T09:23:44+00:00" }, { "name": "CVE-2023-1990", "risk": 5, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:51+00:00", "updated_at": "2023-08-29T09:23:51+00:00" }, { "name": "CVE-2020-36691", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:23:59+00:00", "updated_at": "2023-08-29T09:23:59+00:00" }, { "name": "CVE-2023-1855", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:24:04+00:00", "updated_at": "2023-08-29T09:24:04+00:00" }, { "name": "CVE-2023-3141", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:24:10+00:00", "updated_at": "2023-08-29T09:24:10+00:00" }, { "name": "CVE-2023-3111", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:24:54+00:00", "updated_at": "2023-08-29T09:24:54+00:00" }, { "name": "CVE-2023-1611", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:25:00+00:00", "updated_at": "2023-08-29T09:25:00+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:25:13+00:00", "updated_at": "2023-08-29T09:25:13+00:00" }, { "name": "CVE-2023-2194", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-29T09:25:34+00:00", "updated_at": "2023-08-29T09:25:34+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-06-07T04:14:09+00:00", "updated_at": "2023-06-15T11:09:11+00:00", "deleted_at": null }