de08ad2fb2b36cd9f9b846f79b993f61928d9cf20bfebfa36935b98383dd15ab
daa88ce2d9801bff7e63cdd12a2e1f3be3c8d38b
41612aec69e3c87d28c72efabbe98559
5.4.0-1043.44
linux-gkeop-tools-5.4.0-1043_5.4.0-1043.44_amd64.deb
24419
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1043 /usr/lib/libcpupower.so.5.4.0-1043 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1043/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1043/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1043/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1043/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1043/perf | 21837568 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1043/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1043/bpftool | 552424 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1043/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1043/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3202 | 71 | USN | |
CVE-2022-23039 | 70 | USN | |
CVE-2022-23038 | 70 | USN | |
CVE-2022-23036 | 70 | USN | |
CVE-2022-23037 | 70 | USN | |
CVE-2022-28356 | 75 | USN | |
CVE-2021-3772 | 65 | USN | |
CVE-2022-1966 | 0 | USN | |
CVE-2022-23040 | 70 | USN | |
CVE-2022-1158 | 0 | USN | |
CVE-2022-21499 | 67 | USN | |
CVE-2022-23041 | 70 | USN | |
CVE-2022-28389 | 78 | USN | |
CVE-2022-23042 | 70 | USN | |
CVE-2021-4197 | 78 | USN | |
CVE-2022-1198 | 0 | USN | |
CVE-2022-1516 | 55 | USN | |
CVE-2022-26966 | 55 | USN | |
CVE-2022-24958 | 78 | USN | |
CVE-2022-1011 | 78 | USN | |
CVE-2022-1353 | 0 | USN | |
CVE-2022-28390 | 78 | USN | |
CVE-2022-2380 | 55 | USN | |
CVE-2022-25375 | 55 | USN | |
CVE-2022-32250 | 0 | USN | |
CVE-2022-3239 | 78 | USN | |
CVE-2022-20368 | 98 | USN | |
CVE-2022-20423 | 46 | USN | |
CVE-2022-2977 | 78 | USN | |
CVE-2022-3107 | 6 | USN | |
CVE-2022-3111 | 6 | USN | |
CVE-2023-1637 | 6 | USN |
{ "sha256": "de08ad2fb2b36cd9f9b846f79b993f61928d9cf20bfebfa36935b98383dd15ab", "sha1": "daa88ce2d9801bff7e63cdd12a2e1f3be3c8d38b", "md5": "41612aec69e3c87d28c72efabbe98559", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1043", "filename": "linux-gkeop-tools-5.4.0-1043_5.4.0-1043.44_amd64.deb", "size": 24419, "description": "Linux kernel version specific tools for version 5.4.0-1043\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1043 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1043-<flavour>.", "url": null, "version": "5.4.0-1043.44", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1043", "sha256": "ad25b982554f80742ca36018eb9aaf400df25a6d4a7b3527e6865e4f154a9b26", "sha1": "52d298e9c3156cfac8574ee1b172219ba9308ca1", "md5": "c797e315b3b10bcc7548342c9adbe685", "name": "libcpupower.so.5.4.0-1043", "size": 97800, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:34+00:00", "updated_at": "2022-05-28T04:13:34+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/usbip", "sha256": "f87265f1178c7f00edd073b6a5e898f431f8ff05ff2caa057fe77c2c8724fc85", "sha1": "e5863fdcf70f493f167910b1d33ba7114205a5db", "md5": "f9d7bb52d829368b062408609e88d41d", "name": "usbip", "size": 300512, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:34+00:00", "updated_at": "2022-05-28T04:13:34+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/libperf-jvmti.so", "sha256": "eac14bc981d835ed92f271cac9ad524d23cb0974cd1f84e899ebd655255b5bb5", "sha1": "76eb9837458828821e2f2ee3c0440815ff9c8421", "md5": "97489b97416273aa346296a1f102ab6f", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:34+00:00", "updated_at": "2022-05-28T04:13:34+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/turbostat", "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785", "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846", "md5": "3dca491f8622de5e10e9125e01b85e3e", "name": "turbostat", "size": 134424, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:34+00:00", "updated_at": "2022-05-28T04:13:34+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/cpupower", "sha256": "e6451475dfb433c8e321155cddfade663b06fc4fbfcbbe499ab5ce5f0db45db0", "sha1": "0648ecd2664e54548401ad42929d939e6af7fc31", "md5": "c2e6b1edec1c41884093ba386b0a20e5", "name": "cpupower", "size": 337952, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:34+00:00", "updated_at": "2022-05-28T04:13:34+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/perf", "sha256": "8402fbf9b9622e9ec0906888bf7daf83c1961392e54a3fe6e8058e7cd51062bd", "sha1": "974ba55abe985672e72d5ebe1b1734637907d40a", "md5": "b7b8e81c99358da6b26ccd7f2babad7c", "name": "perf", "size": 21837568, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:35+00:00", "updated_at": "2022-05-28T04:13:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/acpidbg", "sha256": "a9987d996aa0dd210bd82f0bd42030ccc06748e318bd238fdfcee24c042d99c2", "sha1": "fb76c68602a791915b69e9eaf89671b47413dbdd", "md5": "3f8998fa17c3e1e001eedc029a19395c", "name": "acpidbg", "size": 914040, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:35+00:00", "updated_at": "2022-05-28T04:13:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/bpftool", "sha256": "d0bbdc8b118cf8924a91ee6831d5d344ca60e2d67a9a53abfdc91940fa319d76", "sha1": "08b1ed84e9c1150119f9b4c0152a075a01882b39", "md5": "973b9c53013b9608ccb01b610887eb62", "name": "bpftool", "size": 552424, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:35+00:00", "updated_at": "2022-05-28T04:13:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/usbipd", "sha256": "2c27ebef3b2d85b22cbe93e9749f62ae48bc703a57414ccb9a623249d12a9ed2", "sha1": "07888a772b0d8d3b3ebca2cb07a74f9a201782d8", "md5": "7a6ed75f5b2c6ff4c0ff2769b690bb4e", "name": "usbipd", "size": 297128, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:35+00:00", "updated_at": "2022-05-28T04:13:35+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1043/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3744401, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-05-28T04:13:35+00:00", "updated_at": "2022-05-28T04:13:35+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3202", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:06:17+00:00", "updated_at": "2023-02-18T11:06:17+00:00" }, { "name": "CVE-2022-23039", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T01:47:35+00:00", "updated_at": "2022-06-09T01:47:35+00:00" }, { "name": "CVE-2022-23038", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:05:28+00:00", "updated_at": "2022-06-09T02:05:28+00:00" }, { "name": "CVE-2022-23036", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:05:50+00:00", "updated_at": "2022-06-09T02:05:50+00:00" }, { "name": "CVE-2022-23037", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:08:42+00:00", "updated_at": "2022-06-09T02:08:42+00:00" }, { "name": "CVE-2022-28356", "risk": 75, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:09:36+00:00", "updated_at": "2022-06-09T02:09:36+00:00" }, { "name": "CVE-2021-3772", "risk": 65, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:13:33+00:00", "updated_at": "2022-06-09T02:13:33+00:00" }, { "name": "CVE-2022-1966", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:15:27+00:00", "updated_at": "2022-06-09T02:15:27+00:00" }, { "name": "CVE-2022-23040", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:17:12+00:00", "updated_at": "2022-06-09T02:17:12+00:00" }, { "name": "CVE-2022-1158", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:17:25+00:00", "updated_at": "2022-06-09T02:17:25+00:00" }, { "name": "CVE-2022-21499", "risk": 67, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:18:37+00:00", "updated_at": "2022-06-09T02:18:37+00:00" }, { "name": "CVE-2022-23041", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:20:47+00:00", "updated_at": "2022-06-09T02:20:47+00:00" }, { "name": "CVE-2022-28389", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:36:18+00:00", "updated_at": "2022-06-09T02:36:18+00:00" }, { "name": "CVE-2022-23042", "risk": 70, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:41:49+00:00", "updated_at": "2022-06-09T02:41:49+00:00" }, { "name": "CVE-2021-4197", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:47:22+00:00", "updated_at": "2022-06-09T02:47:22+00:00" }, { "name": "CVE-2022-1198", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:49:05+00:00", "updated_at": "2022-06-09T02:49:05+00:00" }, { "name": "CVE-2022-1516", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:50:01+00:00", "updated_at": "2022-06-09T02:50:01+00:00" }, { "name": "CVE-2022-26966", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:58:07+00:00", "updated_at": "2022-06-09T02:58:07+00:00" }, { "name": "CVE-2022-24958", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T02:58:32+00:00", "updated_at": "2022-06-09T02:58:32+00:00" }, { "name": "CVE-2022-1011", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T03:03:55+00:00", "updated_at": "2022-06-09T03:03:55+00:00" }, { "name": "CVE-2022-1353", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T03:04:13+00:00", "updated_at": "2022-06-09T03:04:13+00:00" }, { "name": "CVE-2022-28390", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-06-09T03:09:02+00:00", "updated_at": "2022-06-09T03:09:02+00:00" }, { "name": "CVE-2022-2380", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-14T02:19:26+00:00", "updated_at": "2022-08-14T02:19:26+00:00" }, { "name": "CVE-2022-25375", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-14T02:24:26+00:00", "updated_at": "2022-08-14T02:24:26+00:00" }, { "name": "CVE-2022-32250", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-08-14T02:30:39+00:00", "updated_at": "2022-08-14T02:30:39+00:00" }, { "name": "CVE-2022-3239", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:33:04+00:00", "updated_at": "2023-02-18T11:33:04+00:00" }, { "name": "CVE-2022-20368", "risk": 98, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T11:53:29+00:00", "updated_at": "2023-02-18T11:53:29+00:00" }, { "name": "CVE-2022-20423", "risk": 46, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T12:01:56+00:00", "updated_at": "2023-02-18T12:01:56+00:00" }, { "name": "CVE-2022-2977", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-18T12:06:23+00:00", "updated_at": "2023-02-18T12:06:23+00:00" }, { "name": "CVE-2022-3107", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-07T12:24:38+00:00", "updated_at": "2023-03-07T12:24:38+00:00" }, { "name": "CVE-2022-3111", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:39:18+00:00", "updated_at": "2023-04-21T09:39:18+00:00" }, { "name": "CVE-2023-1637", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-04-21T09:39:50+00:00", "updated_at": "2023-04-21T09:39:50+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 98, "malicious": 0, "created_at": "2022-05-26T11:50:10+00:00", "updated_at": "2022-05-28T03:13:33+00:00", "deleted_at": null }