d09cbe770aa5d9d6437f02295874cad1d05ec6539da53328d59283e1087ad184
bb5751fed5835980c4d31dd74b2055e3ac8d79bd
bbeb9d962f9d46bfad816690d2ee5cef
5.17.0-1004.4
linux-oem-5.17-tools-5.17.0-1004_5.17.0-1004.4_amd64.deb
26273
DEB
linux-oem-5.17
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.17.0-1004 /usr/lib/libcpupower.so.5.17.0-1004 | 81792 | 0 | ||
usbip /usr/lib/linux-oem-5.17-tools-5.17.0-1004/usbip | 248952 | 0 | ||
libperf-jvmti.so /usr/lib/linux-oem-5.17-tools-5.17.0-1004/libperf-jvmti.so | 215944 | 0 | ||
turbostat /usr/lib/linux-oem-5.17-tools-5.17.0-1004/turbostat | 143536 | 0 | ||
cpupower /usr/lib/linux-oem-5.17-tools-5.17.0-1004/cpupower | 294424 | 0 | ||
perf /usr/lib/linux-oem-5.17-tools-5.17.0-1004/perf | 22704728 | 0 | ||
acpidbg /usr/lib/linux-oem-5.17-tools-5.17.0-1004/acpidbg | 934280 | 0 | ||
bpftool /usr/lib/linux-oem-5.17-tools-5.17.0-1004/bpftool | 1709568 | 0 | ||
usbipd /usr/lib/linux-oem-5.17-tools-5.17.0-1004/usbipd | 249352 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-5.17-tools-5.17.0-1004/x86_energy_perf_policy | 46608 | 0 |
{ "sha256": "d09cbe770aa5d9d6437f02295874cad1d05ec6539da53328d59283e1087ad184", "sha1": "bb5751fed5835980c4d31dd74b2055e3ac8d79bd", "md5": "bbeb9d962f9d46bfad816690d2ee5cef", "type": "DEB", "arch": "AMD64", "name": "linux-oem-5.17-tools-5.17.0-1004", "filename": "linux-oem-5.17-tools-5.17.0-1004_5.17.0-1004.4_amd64.deb", "size": 26273, "description": "Linux kernel version specific tools for version 5.17.0-1004\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.17.0-1004 on\n64 bit x86.\nYou probably want to install linux-tools-5.17.0-1004-<flavour>.", "url": null, "version": "5.17.0-1004.4", "source": "linux-oem-5.17", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.17.0-1004", "sha256": "2da432752d27d684d34999251d9cc742931e84fb87f22861007cba5384c7b1c5", "sha1": "4c627c8954bca3720a0e1ab65a7d9b6a306dda73", "md5": "166666df1cec90b60501597850be6312", "name": "libcpupower.so.5.17.0-1004", "size": 81792, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/usbip", "sha256": "4ca71be533b1f0afd208b40b232d3732a6cce6f4081cdb3075fdfaf3a2e429bd", "sha1": "f018b5568f684780458640c8d06c420e2da87fcb", "md5": "4ee90ddf757bc46e63b3ebffe935dd87", "name": "usbip", "size": 248952, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/libperf-jvmti.so", "sha256": "b171d3a59a0eb92c954c26c2e5902ef013680d195b962a5230e1deebdb062f15", "sha1": "c0be0fe7b489920d5263f3c48e89e62358dd9665", "md5": "d159ceff11b29ecf144b900aa9c76885", "name": "libperf-jvmti.so", "size": 215944, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/turbostat", "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206", "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b", "md5": "74e235bf371ac5db13aeeacee0cc7acd", "name": "turbostat", "size": 143536, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/cpupower", "sha256": "0fc1885763328cb134c1b6be1de0e0813b3f40854bf994a2b56f8b9b99ce5e3b", "sha1": "765072248e9ba8a368043c0489f5abae7c8af6c3", "md5": "9ed870d8cf4ac1d6f01910a8e36dbea6", "name": "cpupower", "size": 294424, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/perf", "sha256": "d084345f3b1a908007530a51b2b1df010a74e77da68151f1b82bfbcdf735bf50", "sha1": "45690aaefab131a44e6e7cf33c908e35562052d8", "md5": "03d369c1914c4cb5df13e479a33a21c4", "name": "perf", "size": 22704728, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/acpidbg", "sha256": "939a6d8594ca6a30f39f1601f2c361a0e6714b8287d29d5ef823e87f5af76ac7", "sha1": "651471a467a45793330742b8507f1b508ebcd8e9", "md5": "f5d3bab2f4be792fda64a4b393365e9d", "name": "acpidbg", "size": 934280, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/bpftool", "sha256": "c9641f89fd370888c47efa995aeb948ccaacfcffb6e765603639840adaed3be6", "sha1": "9425ab2394cfe751d014137d9fe27e2d8592f74f", "md5": "707b6756ae8336549a1a7e325b0b298e", "name": "bpftool", "size": 1709568, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/usbipd", "sha256": "6ae7381e6388a6d179fbcd7e3606badefecf705cc2b54dc530f104919e55fad5", "sha1": "0d5f9c13a2c8818b04904c0f88b88de0f23ea95d", "md5": "74436db5eca81dd2c10103e8b73eb757", "name": "usbipd", "size": 249352, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1004/x86_energy_perf_policy", "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543", "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b", "md5": "b22454323232ae918c7ea0cc55df6557", "name": "x86_energy_perf_policy", "size": 46608, "description": null, "package": 3692225, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-06T02:34:03+00:00", "updated_at": "2022-05-06T02:34:03+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-1205", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:39:23+00:00", "updated_at": "2022-09-16T16:39:23+00:00" }, { "name": "CVE-2022-32250", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:53:45+00:00", "updated_at": "2022-09-16T16:53:45+00:00" }, { "name": "CVE-2022-21499", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:54:34+00:00", "updated_at": "2022-09-16T16:54:34+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:54:36+00:00", "updated_at": "2022-09-16T16:54:36+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:55:19+00:00", "updated_at": "2022-09-16T16:55:19+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:57:07+00:00", "updated_at": "2022-09-16T16:57:07+00:00" }, { "name": "CVE-2022-1943", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:11:19+00:00", "updated_at": "2022-09-16T17:11:19+00:00" }, { "name": "CVE-2022-1734", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:11:49+00:00", "updated_at": "2022-09-16T17:11:49+00:00" }, { "name": "CVE-2022-2078", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:13:43+00:00", "updated_at": "2022-09-16T17:13:43+00:00" }, { "name": "CVE-2022-1972", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:15:30+00:00", "updated_at": "2022-09-16T17:15:30+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:16:24+00:00", "updated_at": "2022-09-16T17:16:24+00:00" }, { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:21:11+00:00", "updated_at": "2022-09-16T17:21:11+00:00" }, { "name": "CVE-2022-29968", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-18T22:53:43+00:00", "updated_at": "2022-09-18T22:53:43+00:00" }, { "name": "CVE-2022-29581", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "9a910b644f00bc572f3e4dab682de6cb3a871f49eda9b09175523bc1181a32cc", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1006.6", "filename": "linux-oem-5.17-tools-host_5.17.0-1006.6_all.deb" }, "created_at": "2022-09-19T08:07:27+00:00", "updated_at": "2022-09-19T08:07:27+00:00" }, { "name": "CVE-2022-2639", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-02-18T11:25:02+00:00", "updated_at": "2023-02-18T11:25:02+00:00" }, { "name": "CVE-2022-3526", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-02-18T11:40:18+00:00", "updated_at": "2023-02-18T11:40:18+00:00" }, { "name": "CVE-2022-41858", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-02-18T11:42:55+00:00", "updated_at": "2023-02-18T11:42:55+00:00" }, { "name": "CVE-2023-20938", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-03-07T12:09:56+00:00", "updated_at": "2023-03-07T12:09:56+00:00" }, { "name": "CVE-2023-3439", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-07-12T09:57:58+00:00", "updated_at": "2023-07-12T09:57:58+00:00" }, { "name": "CVE-2023-3159", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-07-12T10:06:21+00:00", "updated_at": "2023-07-12T10:06:21+00:00" }, { "name": "CVE-2023-4389", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-09-13T10:28:03+00:00", "updated_at": "2023-09-13T10:28:03+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-05-04T05:38:09+00:00", "updated_at": "2022-05-06T01:34:02+00:00", "deleted_at": null }