c6ab2056a38407c8ed2072263630c2ae3280fdedf1e140c0d9db40d887656554
9679ea59410de46a6bde7d3a659f25a8636e63c0
cb19ecb4f72f3fb6f1f30d17eb3d7bf7
5.0.0-1018.20
linux-oem-osp1-tools-5.0.0-1018_5.0.0-1018.20_amd64.deb
22852
DEB
linux-oem-osp1
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.26), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.0.0-1018 /usr/lib/libcpupower.so.5.0.0-1018 | 79456 | 0 | ||
usbip /usr/lib/linux-oem-osp1-tools-5.0.0-1018/usbip | 287752 | 0 | ||
turbostat /usr/lib/linux-oem-osp1-tools-5.0.0-1018/turbostat | 129800 | 0 | ||
cpupower /usr/lib/linux-oem-osp1-tools-5.0.0-1018/cpupower | 295616 | 0 | ||
perf /usr/lib/linux-oem-osp1-tools-5.0.0-1018/perf | 21284328 | 0 | ||
acpidbg /usr/lib/linux-oem-osp1-tools-5.0.0-1018/acpidbg | 885824 | 0 | ||
usbipd /usr/lib/linux-oem-osp1-tools-5.0.0-1018/usbipd | 214512 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-osp1-tools-5.0.0-1018/x86_energy_perf_policy | 38360 | 0 |
{ "sha256": "c6ab2056a38407c8ed2072263630c2ae3280fdedf1e140c0d9db40d887656554", "sha1": "9679ea59410de46a6bde7d3a659f25a8636e63c0", "md5": "cb19ecb4f72f3fb6f1f30d17eb3d7bf7", "type": "DEB", "arch": "AMD64", "name": "linux-oem-osp1-tools-5.0.0-1018", "filename": "linux-oem-osp1-tools-5.0.0-1018_5.0.0-1018.20_amd64.deb", "size": 22852, "description": "Linux kernel version specific tools for version 5.0.0-1018\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.0.0-1018 on\n64 bit x86.\nYou probably want to install linux-tools-5.0.0-1018-<flavour>.", "url": null, "version": "5.0.0-1018.20", "source": "linux-oem-osp1", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.26), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.0.0-1018", "sha256": "f7da9bc31ba41aaf937bd46c8126204d3f2f9065f277dbbb5d44f3635b00304f", "sha1": "a03dcfcf16e9795f9b09ce9df1c508cab8665f24", "md5": "aac1e48e461c95c9fd39bd501033ab25", "name": "libcpupower.so.5.0.0-1018", "size": 79456, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-osp1-tools-5.0.0-1018/usbip", "sha256": "f48c2429287f139f2e262ff19f74976d9425a3ad1b30fb9eddf671814d6b78a5", "sha1": "9ad11d5b7192f60a33fcdc0e2f27cea4276b911a", "md5": "b9ff79e8f04362dd26eb0a32914f8be5", "name": "usbip", "size": 287752, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-osp1-tools-5.0.0-1018/turbostat", "sha256": "f7b6edefa35b0f409cccd77445367e6fa84e7efd11b5d0d157ec896f505bd744", "sha1": "19ae8bc5e16eaa45bc9444b337963ac4d811f871", "md5": "8eaed7f7bbda0cd26b0ebe7da6feb11a", "name": "turbostat", "size": 129800, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-osp1-tools-5.0.0-1018/cpupower", "sha256": "30d7acc82b5519f2751dbe505821c66957340711f32b9505b620b3a8aadefea1", "sha1": "5b02bccf02deb1ecaf637e81c8ad687c9b3e2586", "md5": "c24bcb1bd01d2dfeb312c4d201409e8b", "name": "cpupower", "size": 295616, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-osp1-tools-5.0.0-1018/perf", "sha256": "db34b7a29c4e616e7b8addf47687829c28abee1af3bafd73cb80f070da394d23", "sha1": "1191b897432dfc971527bbdced501ff2a5c51cf6", "md5": "df69ff5b1ad022d1ea52575e127a857c", "name": "perf", "size": 21284328, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-osp1-tools-5.0.0-1018/acpidbg", "sha256": "4315eb715f8958909e14e4dba353596a0fb3d6ac784a08be24dc6a520738f79a", "sha1": "83aa2f29310adceadf34471b799d52d2e88a2588", "md5": "0cb2bfcec157f264a9af9c66cbf818c5", "name": "acpidbg", "size": 885824, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-osp1-tools-5.0.0-1018/usbipd", "sha256": "525fa9091e675915aa93e589aebf7b8878cb8ca29acbfb30bcf004eaa02c079c", "sha1": "63f59e81afef5fe7b8a55eb1da5886475e216fe0", "md5": "41c2a9bd6f64b3fa0bf424b8b118b0c0", "name": "usbipd", "size": 214512, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-osp1-tools-5.0.0-1018/x86_energy_perf_policy", "sha256": "86434e81ce74ee3ff5b6315adf7cf838258cd71e3aaa9cfe8e772fcdc33d5221", "sha1": "61938b179890bb33a05d81c7eecca5f28aaaddda", "md5": "d07eeec362098444b5d45d9313a85c48", "name": "x86_energy_perf_policy", "size": 38360, "description": null, "package": 377138, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-04T12:04:00+00:00", "updated_at": "2021-03-04T12:04:00+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2019-15666", "risk": 49, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-21T15:52:40+00:00", "updated_at": "2021-03-21T15:52:40+00:00" }, { "name": "CVE-2019-20095", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-21T16:35:52+00:00", "updated_at": "2021-03-21T16:35:52+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-26T21:52:55+00:00", "updated_at": "2021-10-26T21:52:55+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T04:25:46+00:00", "updated_at": "2021-06-29T22:51:29+00:00" }, { "name": "CVE-2019-19543", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T04:27:45+00:00", "updated_at": "2021-03-22T04:27:45+00:00" }, { "name": "CVE-2019-15031", "risk": 44, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-03-22T04:30:05+00:00", "updated_at": "2021-06-30T01:57:23+00:00" }, { "name": "CVE-2020-10720", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T04:35:37+00:00", "updated_at": "2021-03-22T04:35:37+00:00" }, { "name": "CVE-2019-19966", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T04:50:45+00:00", "updated_at": "2021-03-22T04:50:45+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T05:09:24+00:00", "updated_at": "2021-06-29T22:46:52+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T05:31:02+00:00", "updated_at": "2021-06-30T02:07:14+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T11:25:52+00:00", "updated_at": "2021-07-17T11:25:52+00:00" }, { "name": "CVE-2020-10720", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-03-22T08:01:11+00:00", "updated_at": "2021-03-22T08:01:11+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T09:27:25+00:00", "updated_at": "2021-07-17T09:27:25+00:00" }, { "name": "CVE-2019-19966", "risk": 43, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T10:11:28+00:00", "updated_at": "2021-07-17T10:11:28+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T10:13:52+00:00", "updated_at": "2021-07-17T10:13:52+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T10:50:36+00:00", "updated_at": "2021-07-17T10:50:36+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T05:10:23+00:00", "updated_at": "2021-06-29T23:34:27+00:00" }, { "name": "CVE-2019-15030", "risk": 44, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-03-22T05:12:49+00:00", "updated_at": "2021-06-29T23:53:15+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "USN", "sid": null, "fixed": { "sha256": "b3a3d8e62ed9baa414c71a34a8279e8644343f4c7dfe567b0362eb60e9e37056", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1020.22", "filename": "linux-oem-osp1-tools-host_5.0.0-1020.22_all.deb" }, "created_at": "2021-03-22T05:02:55+00:00", "updated_at": "2021-06-30T00:28:21+00:00" }, { "name": "CVE-2019-14835", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-03-22T05:44:59+00:00", "updated_at": "2021-06-30T01:30:19+00:00" }, { "name": "CVE-2019-20095", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T12:26:15+00:00", "updated_at": "2021-07-17T12:26:15+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T12:30:22+00:00", "updated_at": "2021-07-17T12:30:22+00:00" }, { "name": "CVE-2019-15666", "risk": 49, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T13:18:12+00:00", "updated_at": "2021-07-17T13:18:12+00:00" }, { "name": "CVE-2019-19543", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-07-17T13:44:25+00:00", "updated_at": "2021-07-17T13:44:25+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-27T04:11:27+00:00", "updated_at": "2021-10-27T04:11:27+00:00" }, { "name": "CVE-2019-15666", "risk": 49, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-27T06:56:46+00:00", "updated_at": "2021-10-27T06:56:46+00:00" }, { "name": "CVE-2020-10720", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-27T13:12:09+00:00", "updated_at": "2021-10-27T13:12:09+00:00" }, { "name": "CVE-2019-19966", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-27T16:01:35+00:00", "updated_at": "2021-10-27T16:01:35+00:00" }, { "name": "CVE-2019-19543", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-27T18:33:33+00:00", "updated_at": "2021-10-27T18:33:33+00:00" }, { "name": "CVE-2019-20095", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-27T23:02:18+00:00", "updated_at": "2021-10-27T23:02:18+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-28T04:05:44+00:00", "updated_at": "2021-10-28T04:05:44+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-28T07:52:12+00:00", "updated_at": "2021-10-28T07:52:12+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "USN", "sid": null, "fixed": { "sha256": "c48be834bb994f6cacb48ee411deac9a2a644a09ce8749320b336aaf363f1428", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1022.24", "filename": "linux-oem-osp1-tools-host_5.0.0-1022.24_all.deb" }, "created_at": "2021-10-28T11:41:19+00:00", "updated_at": "2021-10-28T11:41:19+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2019-08-05T11:48:16+00:00", "updated_at": "2021-03-04T12:03:59+00:00", "deleted_at": null }