Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (32)

linux-gkeop-tools-5.4.0-1043

Hashes
Linux kernel version specific tools for version 5.4.0-1043 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 5.4.0-1043 on 64 bit x86. You probably want to install linux-tools-5.4.0-1043-<flavour>.
  • SHA256: de08ad2fb2b36cd9f9b846f79b993f61928d9cf20bfebfa36935b98383dd15ab
  • SHA1: daa88ce2d9801bff7e63cdd12a2e1f3be3c8d38b
  • MD5: 41612aec69e3c87d28c72efabbe98559
Information
  • Version: 5.4.0-1043.44
  • Filename: linux-gkeop-tools-5.4.0-1043_5.4.0-1043.44_amd64.deb
  • Size: 24419
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.5.4.0-1043
/usr/lib/libcpupower.so.5.4.0-1043
978000
usbip
/usr/lib/linux-gkeop-tools-5.4.0-1043/usbip
3005120
libperf-jvmti.so
/usr/lib/linux-gkeop-tools-5.4.0-1043/libperf-jvmti.so
2432640
turbostat
/usr/lib/linux-gkeop-tools-5.4.0-1043/turbostat
1344240
cpupower
/usr/lib/linux-gkeop-tools-5.4.0-1043/cpupower
3379520
perf
/usr/lib/linux-gkeop-tools-5.4.0-1043/perf
218375680
acpidbg
/usr/lib/linux-gkeop-tools-5.4.0-1043/acpidbg
9140400
bpftool
/usr/lib/linux-gkeop-tools-5.4.0-1043/bpftool
5524240
usbipd
/usr/lib/linux-gkeop-tools-5.4.0-1043/usbipd
2971280
x86_energy_perf_policy
/usr/lib/linux-gkeop-tools-5.4.0-1043/x86_energy_perf_policy
385440

Vulnerabilities

Raw Object

{
  "sha256": "de08ad2fb2b36cd9f9b846f79b993f61928d9cf20bfebfa36935b98383dd15ab",
  "sha1": "daa88ce2d9801bff7e63cdd12a2e1f3be3c8d38b",
  "md5": "41612aec69e3c87d28c72efabbe98559",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-gkeop-tools-5.4.0-1043",
  "filename": "linux-gkeop-tools-5.4.0-1043_5.4.0-1043.44_amd64.deb",
  "size": 24419,
  "description": "Linux kernel version specific tools for version 5.4.0-1043\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1043 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1043-<flavour>.",
  "url": null,
  "version": "5.4.0-1043.44",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.5.4.0-1043",
      "sha256": "ad25b982554f80742ca36018eb9aaf400df25a6d4a7b3527e6865e4f154a9b26",
      "sha1": "52d298e9c3156cfac8574ee1b172219ba9308ca1",
      "md5": "c797e315b3b10bcc7548342c9adbe685",
      "name": "libcpupower.so.5.4.0-1043",
      "size": 97800,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:34+00:00",
      "updated_at": "2022-05-28T04:13:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/usbip",
      "sha256": "f87265f1178c7f00edd073b6a5e898f431f8ff05ff2caa057fe77c2c8724fc85",
      "sha1": "e5863fdcf70f493f167910b1d33ba7114205a5db",
      "md5": "f9d7bb52d829368b062408609e88d41d",
      "name": "usbip",
      "size": 300512,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:34+00:00",
      "updated_at": "2022-05-28T04:13:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/libperf-jvmti.so",
      "sha256": "eac14bc981d835ed92f271cac9ad524d23cb0974cd1f84e899ebd655255b5bb5",
      "sha1": "76eb9837458828821e2f2ee3c0440815ff9c8421",
      "md5": "97489b97416273aa346296a1f102ab6f",
      "name": "libperf-jvmti.so",
      "size": 243264,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:34+00:00",
      "updated_at": "2022-05-28T04:13:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/turbostat",
      "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785",
      "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846",
      "md5": "3dca491f8622de5e10e9125e01b85e3e",
      "name": "turbostat",
      "size": 134424,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:34+00:00",
      "updated_at": "2022-05-28T04:13:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/cpupower",
      "sha256": "e6451475dfb433c8e321155cddfade663b06fc4fbfcbbe499ab5ce5f0db45db0",
      "sha1": "0648ecd2664e54548401ad42929d939e6af7fc31",
      "md5": "c2e6b1edec1c41884093ba386b0a20e5",
      "name": "cpupower",
      "size": 337952,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:34+00:00",
      "updated_at": "2022-05-28T04:13:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/perf",
      "sha256": "8402fbf9b9622e9ec0906888bf7daf83c1961392e54a3fe6e8058e7cd51062bd",
      "sha1": "974ba55abe985672e72d5ebe1b1734637907d40a",
      "md5": "b7b8e81c99358da6b26ccd7f2babad7c",
      "name": "perf",
      "size": 21837568,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:35+00:00",
      "updated_at": "2022-05-28T04:13:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/acpidbg",
      "sha256": "a9987d996aa0dd210bd82f0bd42030ccc06748e318bd238fdfcee24c042d99c2",
      "sha1": "fb76c68602a791915b69e9eaf89671b47413dbdd",
      "md5": "3f8998fa17c3e1e001eedc029a19395c",
      "name": "acpidbg",
      "size": 914040,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:35+00:00",
      "updated_at": "2022-05-28T04:13:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/bpftool",
      "sha256": "d0bbdc8b118cf8924a91ee6831d5d344ca60e2d67a9a53abfdc91940fa319d76",
      "sha1": "08b1ed84e9c1150119f9b4c0152a075a01882b39",
      "md5": "973b9c53013b9608ccb01b610887eb62",
      "name": "bpftool",
      "size": 552424,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:35+00:00",
      "updated_at": "2022-05-28T04:13:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/usbipd",
      "sha256": "2c27ebef3b2d85b22cbe93e9749f62ae48bc703a57414ccb9a623249d12a9ed2",
      "sha1": "07888a772b0d8d3b3ebca2cb07a74f9a201782d8",
      "md5": "7a6ed75f5b2c6ff4c0ff2769b690bb4e",
      "name": "usbipd",
      "size": 297128,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:35+00:00",
      "updated_at": "2022-05-28T04:13:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/x86_energy_perf_policy",
      "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c",
      "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef",
      "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3",
      "name": "x86_energy_perf_policy",
      "size": 38544,
      "description": null,
      "package": 3744401,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-05-28T04:13:35+00:00",
      "updated_at": "2022-05-28T04:13:35+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3202",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:06:17+00:00",
      "updated_at": "2023-02-18T11:06:17+00:00"
    },
    {
      "name": "CVE-2022-23039",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T01:47:35+00:00",
      "updated_at": "2022-06-09T01:47:35+00:00"
    },
    {
      "name": "CVE-2022-23038",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:05:28+00:00",
      "updated_at": "2022-06-09T02:05:28+00:00"
    },
    {
      "name": "CVE-2022-23036",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:05:50+00:00",
      "updated_at": "2022-06-09T02:05:50+00:00"
    },
    {
      "name": "CVE-2022-23037",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:08:42+00:00",
      "updated_at": "2022-06-09T02:08:42+00:00"
    },
    {
      "name": "CVE-2022-28356",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:09:36+00:00",
      "updated_at": "2022-06-09T02:09:36+00:00"
    },
    {
      "name": "CVE-2021-3772",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:13:33+00:00",
      "updated_at": "2022-06-09T02:13:33+00:00"
    },
    {
      "name": "CVE-2022-1966",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:15:27+00:00",
      "updated_at": "2022-06-09T02:15:27+00:00"
    },
    {
      "name": "CVE-2022-23040",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:17:12+00:00",
      "updated_at": "2022-06-09T02:17:12+00:00"
    },
    {
      "name": "CVE-2022-1158",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:17:25+00:00",
      "updated_at": "2022-06-09T02:17:25+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:18:37+00:00",
      "updated_at": "2022-06-09T02:18:37+00:00"
    },
    {
      "name": "CVE-2022-23041",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:20:47+00:00",
      "updated_at": "2022-06-09T02:20:47+00:00"
    },
    {
      "name": "CVE-2022-28389",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:36:18+00:00",
      "updated_at": "2022-06-09T02:36:18+00:00"
    },
    {
      "name": "CVE-2022-23042",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:41:49+00:00",
      "updated_at": "2022-06-09T02:41:49+00:00"
    },
    {
      "name": "CVE-2021-4197",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:47:22+00:00",
      "updated_at": "2022-06-09T02:47:22+00:00"
    },
    {
      "name": "CVE-2022-1198",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:49:05+00:00",
      "updated_at": "2022-06-09T02:49:05+00:00"
    },
    {
      "name": "CVE-2022-1516",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:50:01+00:00",
      "updated_at": "2022-06-09T02:50:01+00:00"
    },
    {
      "name": "CVE-2022-26966",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:58:07+00:00",
      "updated_at": "2022-06-09T02:58:07+00:00"
    },
    {
      "name": "CVE-2022-24958",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T02:58:32+00:00",
      "updated_at": "2022-06-09T02:58:32+00:00"
    },
    {
      "name": "CVE-2022-1011",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T03:03:55+00:00",
      "updated_at": "2022-06-09T03:03:55+00:00"
    },
    {
      "name": "CVE-2022-1353",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T03:04:13+00:00",
      "updated_at": "2022-06-09T03:04:13+00:00"
    },
    {
      "name": "CVE-2022-28390",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-06-09T03:09:02+00:00",
      "updated_at": "2022-06-09T03:09:02+00:00"
    },
    {
      "name": "CVE-2022-2380",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:19:26+00:00",
      "updated_at": "2022-08-14T02:19:26+00:00"
    },
    {
      "name": "CVE-2022-25375",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:24:26+00:00",
      "updated_at": "2022-08-14T02:24:26+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2022-08-14T02:30:39+00:00",
      "updated_at": "2022-08-14T02:30:39+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:33:04+00:00",
      "updated_at": "2023-02-18T11:33:04+00:00"
    },
    {
      "name": "CVE-2022-20368",
      "risk": 98,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T11:53:29+00:00",
      "updated_at": "2023-02-18T11:53:29+00:00"
    },
    {
      "name": "CVE-2022-20423",
      "risk": 46,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T12:01:56+00:00",
      "updated_at": "2023-02-18T12:01:56+00:00"
    },
    {
      "name": "CVE-2022-2977",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-02-18T12:06:23+00:00",
      "updated_at": "2023-02-18T12:06:23+00:00"
    },
    {
      "name": "CVE-2022-3107",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-07T12:24:38+00:00",
      "updated_at": "2023-03-07T12:24:38+00:00"
    },
    {
      "name": "CVE-2022-3111",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:39:18+00:00",
      "updated_at": "2023-04-21T09:39:18+00:00"
    },
    {
      "name": "CVE-2023-1637",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:39:50+00:00",
      "updated_at": "2023-04-21T09:39:50+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 98,
  "malicious": 0,
  "created_at": "2022-05-26T11:50:10+00:00",
  "updated_at": "2022-05-28T03:13:33+00:00",
  "deleted_at": null
}