cb928f0baf3a139bf163322b08dd08e3b1488698bab0bc84c958f233c3bbab7d
879fe99c1b39486cc9bf9cc141403548998ebc04
f5dac4389cfccc8e2d968587770a51d6
5.4.0-1050.53
linux-gkeop-tools-5.4.0-1050_5.4.0-1050.53_amd64.deb
24446
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1050 /usr/lib/libcpupower.so.5.4.0-1050 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1050/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1050/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1050/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1050/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1050/perf | 21839312 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1050/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1050/bpftool | 552632 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1050/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1050/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2588 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-28893 | 78 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-2586 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-1974 | 41 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-1679 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-1734 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-1652 | 78 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-0494 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-1048 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-34918 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2022-1975 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
CVE-2021-33061 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1052.55 |
CVE-2021-33656 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1052.55 |
CVE-2023-3159 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1051.54 |
{ "sha256": "cb928f0baf3a139bf163322b08dd08e3b1488698bab0bc84c958f233c3bbab7d", "sha1": "879fe99c1b39486cc9bf9cc141403548998ebc04", "md5": "f5dac4389cfccc8e2d968587770a51d6", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1050", "filename": "linux-gkeop-tools-5.4.0-1050_5.4.0-1050.53_amd64.deb", "size": 24446, "description": "Linux kernel version specific tools for version 5.4.0-1050\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1050 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1050-<flavour>.", "url": null, "version": "5.4.0-1050.53", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1050", "sha256": "582370555d3b31f431203ecdf224b5daebc790d8bced5dabd468f7cebed1ef1b", "sha1": "b9afe31ce6149b3e42ce68d525859f1236e26941", "md5": "f783be8aa0a47f9309926a17cb62702c", "name": "libcpupower.so.5.4.0-1050", "size": 97800, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/usbip", "sha256": "a7cbac3aee4358655d983b528fd59fe2fc32abdd266bb50184f727d60d2d3e9a", "sha1": "abc80d6a7207b41221d92ab1c14145971b0cae2c", "md5": "a4c6eb2843f5e764bd9992f8891ab75e", "name": "usbip", "size": 300512, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/libperf-jvmti.so", "sha256": "e98a83e5e8e59e233bd96216474dea15f48ee33f6921adbec1b6ea6260f2266d", "sha1": "490babd6df5972922a88301d7cb26cd2093ca83e", "md5": "f4278d82c78be9c515bfda1242e5aa03", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/turbostat", "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785", "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846", "md5": "3dca491f8622de5e10e9125e01b85e3e", "name": "turbostat", "size": 134424, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/cpupower", "sha256": "f9fa322f4de953fedc7ee1c76c125844656b543ac1683bc608f4dd4bedae673c", "sha1": "084fd422eff4984abeb0ac183e9b053d46949884", "md5": "d246488e9a34abf9524c58942714b091", "name": "cpupower", "size": 337952, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/perf", "sha256": "6341d600c975a07f5499d87ff2254b731a787e02fc33e6bd9cbf0bbaa12258ce", "sha1": "45a6001e05920ee6c215dd4b733647763ce49fe7", "md5": "efdd34fa6b89e6516831a7dac1ce26f6", "name": "perf", "size": 21839312, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/acpidbg", "sha256": "a1cacfd3ca68b8a06e2e033fb9d060637e5c288b7971e2362fd588a185f8692e", "sha1": "d25b27e79c84db207de7d12a0f1c85b35f6918d1", "md5": "a05134ef9081356e523d5ae40ca44fb9", "name": "acpidbg", "size": 914040, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/bpftool", "sha256": "5e7a98ef7e0a5af366002a423f12353d85a4acc433d8e4785221ad3138703a37", "sha1": "73f1ceab6ea9c9352d50e25ff15e5592c15ed6fb", "md5": "296e5eb0d5cfe7a85ee5a58ddd64c2aa", "name": "bpftool", "size": 552632, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/usbipd", "sha256": "67bf2ae0feefb2f8d4e9da804280bee8d495caecb3503d44883cfb456d7c5715", "sha1": "94e7dc9f364a5dabec15dfacb8f4931337745e11", "md5": "a02c52b9e2e062f383a876ec3cb66d06", "name": "usbipd", "size": 297128, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1050/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3868101, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-25T04:17:48+00:00", "updated_at": "2022-07-25T04:17:48+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2588", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:03:22+00:00", "updated_at": "2022-08-11T03:03:22+00:00" }, { "name": "CVE-2022-28893", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:13:54+00:00", "updated_at": "2022-08-11T03:13:54+00:00" }, { "name": "CVE-2022-2586", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:16:08+00:00", "updated_at": "2022-08-11T03:16:08+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:17:09+00:00", "updated_at": "2022-08-11T03:17:09+00:00" }, { "name": "CVE-2022-1679", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:24:28+00:00", "updated_at": "2022-08-11T03:24:28+00:00" }, { "name": "CVE-2022-1734", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:27:05+00:00", "updated_at": "2022-08-11T03:27:05+00:00" }, { "name": "CVE-2022-1652", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:29:40+00:00", "updated_at": "2022-08-11T03:29:40+00:00" }, { "name": "CVE-2022-0494", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:31:38+00:00", "updated_at": "2022-08-11T03:31:38+00:00" }, { "name": "CVE-2022-1048", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:39:31+00:00", "updated_at": "2022-08-11T03:39:31+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:41:40+00:00", "updated_at": "2022-08-11T03:41:40+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2022-08-11T03:46:08+00:00", "updated_at": "2022-08-11T03:46:08+00:00" }, { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "8dbd221f328d10a4d09192c9ac7e8a3dfbec5d8a37c17db3ff2261b4a15d51cf", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1052.55", "filename": "linux-gkeop-source-5.4.0_5.4.0-1052.55_all.deb" }, "created_at": "2022-09-02T04:45:44+00:00", "updated_at": "2022-09-02T04:45:44+00:00" }, { "name": "CVE-2021-33656", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8dbd221f328d10a4d09192c9ac7e8a3dfbec5d8a37c17db3ff2261b4a15d51cf", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1052.55", "filename": "linux-gkeop-source-5.4.0_5.4.0-1052.55_all.deb" }, "created_at": "2022-09-02T04:47:31+00:00", "updated_at": "2022-09-02T04:47:31+00:00" }, { "name": "CVE-2023-3159", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cfeb99d2fd57dd0e34797fe38b2b5d1d7e817f9ff04f467330cec405ad5df843", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1051.54", "filename": "linux-gkeop-source-5.4.0_5.4.0-1051.54_all.deb" }, "created_at": "2023-07-12T10:06:19+00:00", "updated_at": "2023-07-12T10:06:19+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-24T16:04:05+00:00", "updated_at": "2022-07-25T03:17:47+00:00", "deleted_at": null }