bd573e687fbab072b37e90aa8fcac566ed00a896c40aa4fa1e9121f87a0a9eca
e93fb4457b4182931360621c6b82103f2d4ea3bc
eb3ed5368dbbcf74d6a67869efe78963
5.14.0-1043.48
linux-oem-5.14-tools-5.14.0-1043_5.14.0-1043.48_amd64.deb
31444
DEB
linux-oem-5.14
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.14.0-1043 /usr/lib/libcpupower.so.5.14.0-1043 | 98960 | 0 | ||
usbip /usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbip | 300536 | 0 | ||
libperf-jvmti.so /usr/lib/linux-oem-5.14-tools-5.14.0-1043/libperf-jvmti.so | 236208 | 0 | ||
turbostat /usr/lib/linux-oem-5.14-tools-5.14.0-1043/turbostat | 144688 | 0 | ||
cpupower /usr/lib/linux-oem-5.14-tools-5.14.0-1043/cpupower | 350944 | 0 | ||
perf /usr/lib/linux-oem-5.14-tools-5.14.0-1043/perf | 27536056 | 0 | ||
acpidbg /usr/lib/linux-oem-5.14-tools-5.14.0-1043/acpidbg | 914048 | 0 | ||
bpftool /usr/lib/linux-oem-5.14-tools-5.14.0-1043/bpftool | 1884520 | 0 | ||
usbipd /usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbipd | 297136 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-5.14-tools-5.14.0-1043/x86_energy_perf_policy | 47344 | 0 |
{ "sha256": "bd573e687fbab072b37e90aa8fcac566ed00a896c40aa4fa1e9121f87a0a9eca", "sha1": "e93fb4457b4182931360621c6b82103f2d4ea3bc", "md5": "eb3ed5368dbbcf74d6a67869efe78963", "type": "DEB", "arch": "AMD64", "name": "linux-oem-5.14-tools-5.14.0-1043", "filename": "linux-oem-5.14-tools-5.14.0-1043_5.14.0-1043.48_amd64.deb", "size": 31444, "description": "Linux kernel version specific tools for version 5.14.0-1043\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.14.0-1043 on\n64 bit x86.\nYou probably want to install linux-tools-5.14.0-1043-<flavour>.", "url": null, "version": "5.14.0-1043.48", "source": "linux-oem-5.14", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.14.0-1043", "sha256": "0e6365d4cb24cc4f41153f5beaeae2da601d3d17a069719bd2a28db56f52e4a3", "sha1": "85f1876426eca45d6d747253cbb70f69cb842427", "md5": "4794e2bbfae28f81333f6cd2e8ed3258", "name": "libcpupower.so.5.14.0-1043", "size": 98960, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:50+00:00", "updated_at": "2022-06-23T02:32:50+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbip", "sha256": "65ef3a1c5baf01f8ea662d32ce6f6f36ed3e52caaa7da7951dcddc3f7b92e436", "sha1": "b0dc9def393255b3976b2774addd48abac4e296f", "md5": "52882e3f4a7fd9489976e5de9064dafa", "name": "usbip", "size": 300536, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:50+00:00", "updated_at": "2022-06-23T02:32:50+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/libperf-jvmti.so", "sha256": "ac532c32630323a9860388bd7e4a103993d52b895346f4f377be9ba88bf0fcd3", "sha1": "8f2f8afe6fb59eb658aab76371dd54809d24c5dd", "md5": "5e30eaaa33ca924c3a6479fade2d52c2", "name": "libperf-jvmti.so", "size": 236208, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:50+00:00", "updated_at": "2022-06-23T02:32:50+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/turbostat", "sha256": "df77fabdda15dbb3e8ec4cf33d4ff651412f2fcb8bfad6af25bb934b1e675057", "sha1": "4883cd34a176d9ae2624f2f5b38cff971272f110", "md5": "a9f228dd78795bb68e84bff428100d0f", "name": "turbostat", "size": 144688, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:50+00:00", "updated_at": "2022-06-23T02:32:50+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/cpupower", "sha256": "e1bb53ab0f27b58ad89b8e70e67cfe750a83ead7e3b251b22cb53a7f726bd14b", "sha1": "5792c4fc12e8167d24d0a9659d20bd5128bdcbaf", "md5": "aaf7ed79ccaee17dc8701399e61fedef", "name": "cpupower", "size": 350944, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:50+00:00", "updated_at": "2022-06-23T02:32:50+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/perf", "sha256": "473716be3b48c1cf306ab8996a6aec397d920fba3bc01dce85a98e1b7f1c11f5", "sha1": "35365eb73cf6fb51efbee526baa7150b035bec9b", "md5": "1c0cbd96e3190d4ae861ef32582f0e88", "name": "perf", "size": 27536056, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:51+00:00", "updated_at": "2022-06-23T02:32:51+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/acpidbg", "sha256": "7a9ff346840a47b056321f153e7019f769129778d0e9ecaec526739eeae625f6", "sha1": "a504365fea971c268fdeee2936dd2f53f044a975", "md5": "91a67b2f5f80f12191d65f01302479c2", "name": "acpidbg", "size": 914048, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:51+00:00", "updated_at": "2022-06-23T02:32:51+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/bpftool", "sha256": "bc78354de7e8a02ed9de5b265862aca5c41476dff044d368f62baf491a23c522", "sha1": "17c7bd99357ac7386af402a0ef1edb8bef453cd6", "md5": "20c677d19fe941aad9c891868021754f", "name": "bpftool", "size": 1884520, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:51+00:00", "updated_at": "2022-06-23T02:32:51+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbipd", "sha256": "affe908aa2bd34065ab90b008573d441af54eeca568234a99b3133084f62e7ff", "sha1": "5ec95d538c88df4f4405a14858d8efea140f85a1", "md5": "01a62a15ea095f4c213d09c528c96bc3", "name": "usbipd", "size": 297136, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:51+00:00", "updated_at": "2022-06-23T02:32:51+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/x86_energy_perf_policy", "sha256": "41121c3c7d4a30bd96fc7c98d6174b8cf5f4c1f1e9c342a0320336c9eb85e33e", "sha1": "bd3f89068a581a39950d99359fe7b357294e3d74", "md5": "30594cee1fca84952911e5cf60620df2", "name": "x86_energy_perf_policy", "size": 47344, "description": null, "package": 3800131, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-23T02:32:51+00:00", "updated_at": "2022-06-23T02:32:51+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2023-02-18T11:04:05+00:00", "updated_at": "2023-02-18T11:04:05+00:00" }, { "name": "CVE-2022-21166", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-07-02T03:42:50+00:00", "updated_at": "2022-07-02T03:42:50+00:00" }, { "name": "CVE-2022-21125", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-07-02T03:43:02+00:00", "updated_at": "2022-07-02T03:43:02+00:00" }, { "name": "CVE-2022-21123", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-07-02T03:46:14+00:00", "updated_at": "2022-07-02T03:46:14+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:20:02+00:00", "updated_at": "2022-08-14T02:20:02+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:21:09+00:00", "updated_at": "2022-08-14T02:21:09+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:21:19+00:00", "updated_at": "2022-08-14T02:21:19+00:00" }, { "name": "CVE-2022-28893", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:21:27+00:00", "updated_at": "2022-08-14T02:21:27+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:22:11+00:00", "updated_at": "2022-08-14T02:22:11+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:22:11+00:00", "updated_at": "2022-08-14T02:22:11+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:23:53+00:00", "updated_at": "2022-08-14T02:23:53+00:00" }, { "name": "CVE-2022-1734", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:26:04+00:00", "updated_at": "2022-08-14T02:26:04+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:27:23+00:00", "updated_at": "2022-08-14T02:27:23+00:00" }, { "name": "CVE-2022-1652", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2022-08-14T02:32:00+00:00", "updated_at": "2022-08-14T02:32:00+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2023-02-18T11:54:14+00:00", "updated_at": "2023-02-18T11:54:14+00:00" }, { "name": "CVE-2022-3077", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2023-02-18T12:10:38+00:00", "updated_at": "2023-02-18T12:10:38+00:00" }, { "name": "CVE-2022-2959", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2023-02-18T12:30:27+00:00", "updated_at": "2023-02-18T12:30:27+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5", "name": "linux-oem-5.14-tools-host", "version": "5.14.0-1044.49", "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb" }, "created_at": "2023-03-07T11:46:36+00:00", "updated_at": "2023-03-07T11:46:36+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-06-22T10:19:06+00:00", "updated_at": "2022-06-23T01:32:49+00:00", "deleted_at": null }