d6aaa59f8bbec573fc92355e28a3d3d474d1bccd55ed3cba3718396bb69a4dad
e82866675b88386c912ac6ede7392252e3c4871b
10c06cc4586886671760ebe11b4a17e8
5.15.0-54.60
linux-tools-5.15.0-54_5.15.0-54.60_amd64.deb
25992
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.15.0-54 /usr/lib/libcpupower.so.5.15.0-54 | 81776 | 0 | ||
usbip /usr/lib/linux-tools-5.15.0-54/usbip | 248920 | 0 | ||
libperf-jvmti.so /usr/lib/linux-tools-5.15.0-54/libperf-jvmti.so | 215888 | 0 | ||
turbostat /usr/lib/linux-tools-5.15.0-54/turbostat | 143544 | 0 | ||
cpupower /usr/lib/linux-tools-5.15.0-54/cpupower | 294416 | 0 | ||
perf /usr/lib/linux-tools-5.15.0-54/perf | 22355888 | 0 | ||
acpidbg /usr/lib/linux-tools-5.15.0-54/acpidbg | 934264 | 0 | ||
bpftool /usr/lib/linux-tools-5.15.0-54/bpftool | 1591976 | 0 | ||
usbipd /usr/lib/linux-tools-5.15.0-54/usbipd | 249320 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-tools-5.15.0-54/x86_energy_perf_policy | 46616 | 0 |
{ "sha256": "d6aaa59f8bbec573fc92355e28a3d3d474d1bccd55ed3cba3718396bb69a4dad", "sha1": "e82866675b88386c912ac6ede7392252e3c4871b", "md5": "10c06cc4586886671760ebe11b4a17e8", "type": "DEB", "arch": "AMD64", "name": "linux-tools-5.15.0-54", "filename": "linux-tools-5.15.0-54_5.15.0-54.60_amd64.deb", "size": 25992, "description": "Linux kernel version specific tools for version 5.15.0-54\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.15.0-54 on\n64 bit x86.\nYou probably want to install linux-tools-5.15.0-54-<flavour>.", "url": null, "version": "5.15.0-54.60", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.15.0-54", "sha256": "4a8890a1b8c2d5b10c84a28c8d7b8ede146df9680c469cb25fde7b93dbed60da", "sha1": "dafaa1d46222ca8cbf92ad2457a49af0a9eb35d9", "md5": "ddfef516ecf14e2e24f7679d0beab983", "name": "libcpupower.so.5.15.0-54", "size": 81776, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:47+00:00", "updated_at": "2022-11-17T10:21:47+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/usbip", "sha256": "cd477aec98fab42f5a2640ff4a1b9fe8a26d00ec29826c9a52b2d91297aebe2f", "sha1": "9e8d6749ca6e3cbe52661a7697905eb71c91ff9e", "md5": "f15edfefef0af4eff5815e738acddd06", "name": "usbip", "size": 248920, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:47+00:00", "updated_at": "2022-11-17T10:21:47+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/libperf-jvmti.so", "sha256": "15216d577676e9666b970ae959e2b09005e885c238c560bd6c88f1de9e855508", "sha1": "8e06143d1b212ee0bee63e697513e2b7b8a201ef", "md5": "f1686040f5b87a7ab8d7e9584a488d1c", "name": "libperf-jvmti.so", "size": 215888, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:47+00:00", "updated_at": "2022-11-17T10:21:47+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/turbostat", "sha256": "11f39965019c0ad6d8e43a6ce02749543eb26cc68164f58ee797a89886d64d20", "sha1": "c810d09463f3c1cd49656662d11f98c6463644fa", "md5": "8f51926061fb7ebc823f4dec3fbf810d", "name": "turbostat", "size": 143544, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:47+00:00", "updated_at": "2022-11-17T10:21:47+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/cpupower", "sha256": "8793a47e88c76756220bf06d00803c03b9c21052856cba81d188ccb84250403a", "sha1": "79d84719f25710eca357fc51b8132b54df03b235", "md5": "c410c37f7f6df38b1f79fe000835eb0b", "name": "cpupower", "size": 294416, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:47+00:00", "updated_at": "2022-11-17T10:21:47+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/perf", "sha256": "4f537b94086dbd81871cd79eb370b591850a5501e1fa609ba8c742400ed13106", "sha1": "145ad76183328a294caef777e57fdebd002e96a0", "md5": "7190b52b4d3f2d8dc43db2d088f6fda8", "name": "perf", "size": 22355888, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:47+00:00", "updated_at": "2022-11-17T10:21:47+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/acpidbg", "sha256": "7dabcaac93404113028f600f842e47ab3e34c2c52f20ce31fd08fc02a408d52f", "sha1": "a3a710258f38bda4d70bb51828e43aaefe297082", "md5": "83c47b2d18a41d444b576323c493e2d8", "name": "acpidbg", "size": 934264, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:47+00:00", "updated_at": "2022-11-17T10:21:47+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/bpftool", "sha256": "353cfd6cdb666d63a8405f9bbd5590245aa8417f9803237f2ea1a4af3e28de3c", "sha1": "72bfd34633bb36449b215055a3010815463ff9ea", "md5": "4df7fa2cb1bc83ec2ed618780884ca8a", "name": "bpftool", "size": 1591976, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:48+00:00", "updated_at": "2022-11-17T10:21:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/usbipd", "sha256": "c622bdba69f6bf3f25eae9b43c9dd44d4197e6dcce487977110fabfda83af613", "sha1": "60b8e9eabc5b9e87c92023df0bb2fba2fd2826ba", "md5": "2b4473a98f7e474630f2af11da59fa14", "name": "usbipd", "size": 249320, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:48+00:00", "updated_at": "2022-11-17T10:21:48+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-5.15.0-54/x86_energy_perf_policy", "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643", "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5", "md5": "e9d52e1dde799b718aef361de0e9b299", "name": "x86_energy_perf_policy", "size": 46616, "description": null, "package": 4907220, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:48+00:00", "updated_at": "2022-11-17T10:21:48+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:27:37+00:00", "updated_at": "2022-12-02T12:27:37+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:37:58+00:00", "updated_at": "2022-12-02T12:37:58+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:39:49+00:00", "updated_at": "2022-12-02T12:39:49+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:41:44+00:00", "updated_at": "2022-12-02T12:41:44+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:42:31+00:00", "updated_at": "2022-12-02T12:42:31+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:43:18+00:00", "updated_at": "2022-12-02T12:43:18+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:44:22+00:00", "updated_at": "2022-12-02T12:44:22+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:45:48+00:00", "updated_at": "2022-12-02T12:45:48+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "0faf209d04ed493e2aac4be1fdbbf1f55f291af3ac052f62d6357b07a61b16bc", "name": "linux-source-5.15.0", "version": "5.15.0-56.62", "filename": "linux-source-5.15.0_5.15.0-56.62_all.deb" }, "created_at": "2022-12-02T12:46:27+00:00", "updated_at": "2022-12-02T12:46:27+00:00" }, { "name": "CVE-2022-3649", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T11:41:22+00:00", "updated_at": "2023-01-07T11:41:22+00:00" }, { "name": "CVE-2022-0171", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T11:55:32+00:00", "updated_at": "2023-01-07T11:55:32+00:00" }, { "name": "CVE-2022-2663", "risk": 53, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T11:58:21+00:00", "updated_at": "2023-01-07T11:58:21+00:00" }, { "name": "CVE-2022-3646", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T12:24:04+00:00", "updated_at": "2023-01-07T12:24:04+00:00" }, { "name": "CVE-2022-3061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T13:01:08+00:00", "updated_at": "2023-01-07T13:01:08+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T13:44:05+00:00", "updated_at": "2023-01-07T13:44:05+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T14:23:14+00:00", "updated_at": "2023-01-07T14:23:14+00:00" }, { "name": "CVE-2022-43750", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T14:47:30+00:00", "updated_at": "2023-01-07T14:47:30+00:00" }, { "name": "CVE-2022-20421", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T14:50:04+00:00", "updated_at": "2023-01-07T14:50:04+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:08:37+00:00", "updated_at": "2023-01-07T15:08:37+00:00" }, { "name": "CVE-2022-39842", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:34:27+00:00", "updated_at": "2023-01-07T15:34:27+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:37:02+00:00", "updated_at": "2023-01-07T15:37:02+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-01-07T15:37:29+00:00", "updated_at": "2023-01-07T15:37:29+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-02-18T11:46:02+00:00", "updated_at": "2023-02-18T11:46:02+00:00" }, { "name": "CVE-2022-42432", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-04-21T09:24:11+00:00", "updated_at": "2023-04-21T09:24:11+00:00" }, { "name": "CVE-2022-2308", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-04-21T09:29:06+00:00", "updated_at": "2023-04-21T09:29:06+00:00" }, { "name": "CVE-2022-3903", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-04-21T09:37:07+00:00", "updated_at": "2023-04-21T09:37:07+00:00" }, { "name": "CVE-2023-2860", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "ef83e1526f71fd895a9e70ca9c69e49a604978948ef72413933f5fe9b9280cc5", "name": "linux-source-5.15.0", "version": "5.15.0-57.63", "filename": "linux-source-5.15.0_5.15.0-57.63_all.deb" }, "created_at": "2023-07-12T10:07:45+00:00", "updated_at": "2023-07-12T10:07:45+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 98, "malicious": 0, "created_at": "2022-11-15T13:59:04+00:00", "updated_at": "2022-11-17T10:21:46+00:00", "deleted_at": null }