Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (18)

linux-oem-5.14-tools-5.14.0-1043

Hashes
Linux kernel version specific tools for version 5.14.0-1043 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.14.0-1043 on 64 bit x86. You probably want to install linux-tools-5.14.0-1043-<flavour>.
  • SHA256: bd573e687fbab072b37e90aa8fcac566ed00a896c40aa4fa1e9121f87a0a9eca
  • SHA1: e93fb4457b4182931360621c6b82103f2d4ea3bc
  • MD5: eb3ed5368dbbcf74d6a67869efe78963
Information
  • Version: 5.14.0-1043.48
  • Filename: linux-oem-5.14-tools-5.14.0-1043_5.14.0-1043.48_amd64.deb
  • Size: 31444
  • Type: DEB
  • Source: linux-oem-5.14
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.14.0-1043
/usr/lib/libcpupower.so.5.14.0-1043
989600
usbip
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbip
3005360
libperf-jvmti.so
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/libperf-jvmti.so
2362080
turbostat
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/turbostat
1446880
cpupower
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/cpupower
3509440
perf
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/perf
275360560
acpidbg
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/acpidbg
9140480
bpftool
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/bpftool
18845200
usbipd
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbipd
2971360
x86_energy_perf_policy
/usr/lib/linux-oem-5.14-tools-5.14.0-1043/x86_energy_perf_policy
473440

Vulnerabilities

NameRiskSourceFixed
CVE-2022-287355USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-211660USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-211250USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-211230USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-17890USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-197441USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-172970USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-2889378USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-101291USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-322960USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-18520USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-17340USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-197555USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-165278USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-250367USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-307755USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-295970USN
linux-oem-5.14-tools-host
5.14.0-1044.49
CVE-2022-205727USN
linux-oem-5.14-tools-host
5.14.0-1044.49

Raw Object

{
  "sha256": "bd573e687fbab072b37e90aa8fcac566ed00a896c40aa4fa1e9121f87a0a9eca",
  "sha1": "e93fb4457b4182931360621c6b82103f2d4ea3bc",
  "md5": "eb3ed5368dbbcf74d6a67869efe78963",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-5.14-tools-5.14.0-1043",
  "filename": "linux-oem-5.14-tools-5.14.0-1043_5.14.0-1043.48_amd64.deb",
  "size": 31444,
  "description": "Linux kernel version specific tools for version 5.14.0-1043\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.14.0-1043 on\n64 bit x86.\nYou probably want to install linux-tools-5.14.0-1043-<flavour>.",
  "url": null,
  "version": "5.14.0-1043.48",
  "source": "linux-oem-5.14",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.14.0-1043",
      "sha256": "0e6365d4cb24cc4f41153f5beaeae2da601d3d17a069719bd2a28db56f52e4a3",
      "sha1": "85f1876426eca45d6d747253cbb70f69cb842427",
      "md5": "4794e2bbfae28f81333f6cd2e8ed3258",
      "name": "libcpupower.so.5.14.0-1043",
      "size": 98960,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:50+00:00",
      "updated_at": "2022-06-23T02:32:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbip",
      "sha256": "65ef3a1c5baf01f8ea662d32ce6f6f36ed3e52caaa7da7951dcddc3f7b92e436",
      "sha1": "b0dc9def393255b3976b2774addd48abac4e296f",
      "md5": "52882e3f4a7fd9489976e5de9064dafa",
      "name": "usbip",
      "size": 300536,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:50+00:00",
      "updated_at": "2022-06-23T02:32:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/libperf-jvmti.so",
      "sha256": "ac532c32630323a9860388bd7e4a103993d52b895346f4f377be9ba88bf0fcd3",
      "sha1": "8f2f8afe6fb59eb658aab76371dd54809d24c5dd",
      "md5": "5e30eaaa33ca924c3a6479fade2d52c2",
      "name": "libperf-jvmti.so",
      "size": 236208,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:50+00:00",
      "updated_at": "2022-06-23T02:32:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/turbostat",
      "sha256": "df77fabdda15dbb3e8ec4cf33d4ff651412f2fcb8bfad6af25bb934b1e675057",
      "sha1": "4883cd34a176d9ae2624f2f5b38cff971272f110",
      "md5": "a9f228dd78795bb68e84bff428100d0f",
      "name": "turbostat",
      "size": 144688,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:50+00:00",
      "updated_at": "2022-06-23T02:32:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/cpupower",
      "sha256": "e1bb53ab0f27b58ad89b8e70e67cfe750a83ead7e3b251b22cb53a7f726bd14b",
      "sha1": "5792c4fc12e8167d24d0a9659d20bd5128bdcbaf",
      "md5": "aaf7ed79ccaee17dc8701399e61fedef",
      "name": "cpupower",
      "size": 350944,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:50+00:00",
      "updated_at": "2022-06-23T02:32:50+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/perf",
      "sha256": "473716be3b48c1cf306ab8996a6aec397d920fba3bc01dce85a98e1b7f1c11f5",
      "sha1": "35365eb73cf6fb51efbee526baa7150b035bec9b",
      "md5": "1c0cbd96e3190d4ae861ef32582f0e88",
      "name": "perf",
      "size": 27536056,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:51+00:00",
      "updated_at": "2022-06-23T02:32:51+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/acpidbg",
      "sha256": "7a9ff346840a47b056321f153e7019f769129778d0e9ecaec526739eeae625f6",
      "sha1": "a504365fea971c268fdeee2936dd2f53f044a975",
      "md5": "91a67b2f5f80f12191d65f01302479c2",
      "name": "acpidbg",
      "size": 914048,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:51+00:00",
      "updated_at": "2022-06-23T02:32:51+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/bpftool",
      "sha256": "bc78354de7e8a02ed9de5b265862aca5c41476dff044d368f62baf491a23c522",
      "sha1": "17c7bd99357ac7386af402a0ef1edb8bef453cd6",
      "md5": "20c677d19fe941aad9c891868021754f",
      "name": "bpftool",
      "size": 1884520,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:51+00:00",
      "updated_at": "2022-06-23T02:32:51+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/usbipd",
      "sha256": "affe908aa2bd34065ab90b008573d441af54eeca568234a99b3133084f62e7ff",
      "sha1": "5ec95d538c88df4f4405a14858d8efea140f85a1",
      "md5": "01a62a15ea095f4c213d09c528c96bc3",
      "name": "usbipd",
      "size": 297136,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:51+00:00",
      "updated_at": "2022-06-23T02:32:51+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-5.14-tools-5.14.0-1043/x86_energy_perf_policy",
      "sha256": "41121c3c7d4a30bd96fc7c98d6174b8cf5f4c1f1e9c342a0320336c9eb85e33e",
      "sha1": "bd3f89068a581a39950d99359fe7b357294e3d74",
      "md5": "30594cee1fca84952911e5cf60620df2",
      "name": "x86_energy_perf_policy",
      "size": 47344,
      "description": null,
      "package": 3800131,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-23T02:32:51+00:00",
      "updated_at": "2022-06-23T02:32:51+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2023-02-18T11:04:05+00:00",
      "updated_at": "2023-02-18T11:04:05+00:00"
    },
    {
      "name": "CVE-2022-21166",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-07-02T03:42:50+00:00",
      "updated_at": "2022-07-02T03:42:50+00:00"
    },
    {
      "name": "CVE-2022-21125",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-07-02T03:43:02+00:00",
      "updated_at": "2022-07-02T03:43:02+00:00"
    },
    {
      "name": "CVE-2022-21123",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-07-02T03:46:14+00:00",
      "updated_at": "2022-07-02T03:46:14+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:20:02+00:00",
      "updated_at": "2022-08-14T02:20:02+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:21:09+00:00",
      "updated_at": "2022-08-14T02:21:09+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:21:19+00:00",
      "updated_at": "2022-08-14T02:21:19+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:21:27+00:00",
      "updated_at": "2022-08-14T02:21:27+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:22:11+00:00",
      "updated_at": "2022-08-14T02:22:11+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:22:11+00:00",
      "updated_at": "2022-08-14T02:22:11+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:23:53+00:00",
      "updated_at": "2022-08-14T02:23:53+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:26:04+00:00",
      "updated_at": "2022-08-14T02:26:04+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:27:23+00:00",
      "updated_at": "2022-08-14T02:27:23+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2022-08-14T02:32:00+00:00",
      "updated_at": "2022-08-14T02:32:00+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2023-02-18T11:54:14+00:00",
      "updated_at": "2023-02-18T11:54:14+00:00"
    },
    {
      "name": "CVE-2022-3077",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2023-02-18T12:10:38+00:00",
      "updated_at": "2023-02-18T12:10:38+00:00"
    },
    {
      "name": "CVE-2022-2959",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2023-02-18T12:30:27+00:00",
      "updated_at": "2023-02-18T12:30:27+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f12c2687dbdb1d528a728a7b1e971cb7cfc845263580efbeb80830c0aa8a8da5",
        "name": "linux-oem-5.14-tools-host",
        "version": "5.14.0-1044.49",
        "filename": "linux-oem-5.14-tools-host_5.14.0-1044.49_all.deb"
      },
      "created_at": "2023-03-07T11:46:36+00:00",
      "updated_at": "2023-03-07T11:46:36+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-22T10:19:06+00:00",
  "updated_at": "2022-06-23T01:32:49+00:00",
  "deleted_at": null
}