d27f4592ea533fdf129e993e82d8d114974906cb75b77979a561aa84038ed4a8
2ee5b66d80e4ff36ade53f0d72f88ab735fe66e1
38cd51ca6b46c5c7a82730148ae47c2c
5.15.0-1024.29
linux-gke-tools-5.15.0-1024_5.15.0-1024.29_amd64.deb
24981
DEB
linux-gke
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.15.0-1024 /usr/lib/libcpupower.so.5.15.0-1024 | 81784 | 0 | ||
usbip /usr/lib/linux-gke-tools-5.15.0-1024/usbip | 248936 | 0 | ||
turbostat /usr/lib/linux-gke-tools-5.15.0-1024/turbostat | 143544 | 0 | ||
cpupower /usr/lib/linux-gke-tools-5.15.0-1024/cpupower | 294424 | 0 | ||
perf /usr/lib/linux-gke-tools-5.15.0-1024/perf | 22356304 | 0 | ||
bpftool /usr/lib/linux-gke-tools-5.15.0-1024/bpftool | 1592000 | 0 | ||
usbipd /usr/lib/linux-gke-tools-5.15.0-1024/usbipd | 249336 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gke-tools-5.15.0-1024/x86_energy_perf_policy | 46616 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | |
CVE-2022-3543 | 55 | USN | |
CVE-2022-42896 | 9 | USN | |
CVE-2022-3623 | 8 | USN | |
CVE-2022-3643 | 10 | USN | |
CVE-2022-3640 | 9 | USN | |
CVE-2022-42895 | 6 | USN | |
CVE-2023-0590 | 5 | USN | |
CVE-2022-3619 | 43 | USN | |
CVE-2022-41850 | 47 | USN | |
CVE-2022-45934 | 8 | USN | |
CVE-2022-47940 | 8 | USN | |
CVE-2022-4378 | 8 | USN | |
CVE-2022-41849 | 42 | USN | |
CVE-2023-22998 | 6 | USN | |
CVE-2022-1184 | 0 | USN | |
CVE-2023-3006 | 0 | USN | |
CVE-2023-3812 | 0 | USN |
{ "sha256": "d27f4592ea533fdf129e993e82d8d114974906cb75b77979a561aa84038ed4a8", "sha1": "2ee5b66d80e4ff36ade53f0d72f88ab735fe66e1", "md5": "38cd51ca6b46c5c7a82730148ae47c2c", "type": "DEB", "arch": "AMD64", "name": "linux-gke-tools-5.15.0-1024", "filename": "linux-gke-tools-5.15.0-1024_5.15.0-1024.29_amd64.deb", "size": 24981, "description": "Linux kernel version specific tools for version 5.15.0-1024\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-1024 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-1024-<flavour>.", "url": null, "version": "5.15.0-1024.29", "source": "linux-gke", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.15.0-1024", "sha256": "643ebd737f5bd0fce85c43f4f452031c3f02617059ca842b325666606aa665c8", "sha1": "82240503d897332fd6ccd01cb5e40401eae89072", "md5": "14eba810fd028222600c582aa6d3fae8", "name": "libcpupower.so.5.15.0-1024", "size": 81784, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:48+00:00", "updated_at": "2022-12-18T10:25:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.15.0-1024/usbip", "sha256": "0efaa02be5b9409025a1b894fa35859518194c8346a3c4b289f3a9dbc551cc92", "sha1": "17c98198bd3f306a31cd75bc3f12e201a508a4dc", "md5": "9540cc41ef95cefa312c011ec94a9b3c", "name": "usbip", "size": 248936, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:48+00:00", "updated_at": "2022-12-18T10:25:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.15.0-1024/turbostat", "sha256": "11f39965019c0ad6d8e43a6ce02749543eb26cc68164f58ee797a89886d64d20", "sha1": "c810d09463f3c1cd49656662d11f98c6463644fa", "md5": "8f51926061fb7ebc823f4dec3fbf810d", "name": "turbostat", "size": 143544, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:48+00:00", "updated_at": "2022-12-18T10:25:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.15.0-1024/cpupower", "sha256": "4ffaa6d9656b48fb90ab9e91d11cae35ca4f9c741d65e748e11fb08ba0fbd51e", "sha1": "9544569137e4b3f2248c62d3507ff4e78b04de5f", "md5": "8ddd2591fdd5ad67bc8f7bddd92385bf", "name": "cpupower", "size": 294424, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:48+00:00", "updated_at": "2022-12-18T10:25:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.15.0-1024/perf", "sha256": "d7e64e4b0f30536be8950c6c6327dc46c2e347ab8d528420fbb8b01f57e25208", "sha1": "487a212957de7d7b945ceb5c3eec83145190b4d7", "md5": "5350edb82e13af1aed04a9d500f1a357", "name": "perf", "size": 22356304, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:49+00:00", "updated_at": "2022-12-18T10:25:49+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.15.0-1024/bpftool", "sha256": "42448966ffc83aa7fb25e697af40e05b4d2718f691bde5d52cf03db1d29e5ce8", "sha1": "7389a256eee267d672e475e678a20ce846e55249", "md5": "7e4de1000939007ec285cf0b53d13bc2", "name": "bpftool", "size": 1592000, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:49+00:00", "updated_at": "2022-12-18T10:25:49+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.15.0-1024/usbipd", "sha256": "35c202e510f4eb28f635e5ec61ed6e2b52161846c261691239ff0efc7c4b6e98", "sha1": "5425d602408a10b071c1d1e94a3e4c91d3db047c", "md5": "8734cd9dab3f462ab43c13a160d14925", "name": "usbipd", "size": 249336, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:49+00:00", "updated_at": "2022-12-18T10:25:49+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.15.0-1024/x86_energy_perf_policy", "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643", "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5", "md5": "e9d52e1dde799b718aef361de0e9b299", "name": "x86_energy_perf_policy", "size": 46616, "description": null, "package": 4989187, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-18T10:25:49+00:00", "updated_at": "2022-12-18T10:25:49+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:18:45+00:00", "updated_at": "2023-02-10T10:18:45+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:22:55+00:00", "updated_at": "2023-02-10T10:22:55+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:26:17+00:00", "updated_at": "2023-02-10T10:26:17+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:27:55+00:00", "updated_at": "2023-02-10T10:27:55+00:00" }, { "name": "CVE-2022-3643", "risk": 10, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:28:13+00:00", "updated_at": "2023-02-10T10:28:13+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:30:15+00:00", "updated_at": "2023-02-10T10:30:15+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:31:32+00:00", "updated_at": "2023-02-10T10:31:32+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:32:52+00:00", "updated_at": "2023-02-10T10:32:52+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:33:00+00:00", "updated_at": "2023-02-10T10:33:00+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:35:06+00:00", "updated_at": "2023-02-10T10:35:06+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:37:34+00:00", "updated_at": "2023-02-10T10:37:34+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:39:35+00:00", "updated_at": "2023-02-10T10:39:35+00:00" }, { "name": "CVE-2022-4378", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:40:21+00:00", "updated_at": "2023-02-10T10:40:21+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-10T10:41:20+00:00", "updated_at": "2023-02-10T10:41:20+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:28:53+00:00", "updated_at": "2023-04-21T09:28:53+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-06T10:06:19+00:00", "updated_at": "2023-06-06T10:06:19+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-07-12T10:07:03+00:00", "updated_at": "2023-07-12T10:07:03+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-09T09:33:08+00:00", "updated_at": "2023-08-09T09:33:08+00:00" } ], "risk": 100, "vulnerable": 100, "outdated": 100, "malicious": 0, "created_at": "2022-12-16T07:49:09+00:00", "updated_at": "2022-12-18T10:25:48+00:00", "deleted_at": null }