e3d7d0d38f0b51d663ec7089225501732d88e8a7dd59efdbccd1f07932f1e45a
dcc0088218ca56fa0cf61b7ab464a0101d8da244
03a34fa28487a355c6b6f35182d0faac
5.17.0-1009.9
linux-oem-5.17-tools-5.17.0-1009_5.17.0-1009.9_amd64.deb
26293
DEB
linux-oem-5.17
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.17.0-1009 /usr/lib/libcpupower.so.5.17.0-1009 | 81792 | 0 | ||
usbip /usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbip | 248952 | 0 | ||
libperf-jvmti.so /usr/lib/linux-oem-5.17-tools-5.17.0-1009/libperf-jvmti.so | 215944 | 0 | ||
turbostat /usr/lib/linux-oem-5.17-tools-5.17.0-1009/turbostat | 143536 | 0 | ||
cpupower /usr/lib/linux-oem-5.17-tools-5.17.0-1009/cpupower | 294424 | 0 | ||
perf /usr/lib/linux-oem-5.17-tools-5.17.0-1009/perf | 22704880 | 0 | ||
acpidbg /usr/lib/linux-oem-5.17-tools-5.17.0-1009/acpidbg | 934280 | 0 | ||
bpftool /usr/lib/linux-oem-5.17-tools-5.17.0-1009/bpftool | 1709568 | 0 | ||
usbipd /usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbipd | 249352 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-5.17-tools-5.17.0-1009/x86_energy_perf_policy | 46608 | 0 |
{ "sha256": "e3d7d0d38f0b51d663ec7089225501732d88e8a7dd59efdbccd1f07932f1e45a", "sha1": "dcc0088218ca56fa0cf61b7ab464a0101d8da244", "md5": "03a34fa28487a355c6b6f35182d0faac", "type": "DEB", "arch": "AMD64", "name": "linux-oem-5.17-tools-5.17.0-1009", "filename": "linux-oem-5.17-tools-5.17.0-1009_5.17.0-1009.9_amd64.deb", "size": 26293, "description": "Linux kernel version specific tools for version 5.17.0-1009\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.17.0-1009 on\n64 bit x86.\nYou probably want to install linux-tools-5.17.0-1009-<flavour>.", "url": null, "version": "5.17.0-1009.9", "source": "linux-oem-5.17", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.17.0-1009", "sha256": "f6301e0329c091f3d2418417a51b3c023d4d850736af7d5957a250c8ccde583c", "sha1": "41940f4e90cdfdaf6ddbf9ec2f4eefbc65ede6b0", "md5": "3d7ddc76fc10a3c64db978cb2e975943", "name": "libcpupower.so.5.17.0-1009", "size": 81792, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbip", "sha256": "a426ce002b49408b4cdfda2c0c915f99e578244c5807827c83e279e148f14be7", "sha1": "08004884e41cf5adf72ba0b237789db1fba5b9a4", "md5": "8a556595d17dffed1aa04bd0e9d0dd03", "name": "usbip", "size": 248952, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/libperf-jvmti.so", "sha256": "bb3c2435f07aafd3ec4f4824b5c031a67e3d7c5ab97b481fbdc02cba6ead55f4", "sha1": "85831979bb0f5bba57c463d2f01859f9d4bc3ee2", "md5": "223e4cf0c3cdb2e700251edb6318df5d", "name": "libperf-jvmti.so", "size": 215944, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/turbostat", "sha256": "ec28829c670634944ac785782b9a2e163ca6c2920412d9a71216b324bb884206", "sha1": "48ebb67b8acee820072a74dad4cd5c450ca1453b", "md5": "74e235bf371ac5db13aeeacee0cc7acd", "name": "turbostat", "size": 143536, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/cpupower", "sha256": "9d2ee70809f6521bcbed0f176f63e97165dc0989f0374db57dc18f0c096c0b60", "sha1": "e444af02468a105e363b3eb92d1ecee211686811", "md5": "09b350ff5c0bb0d88029cb4db8c3f7bb", "name": "cpupower", "size": 294424, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/perf", "sha256": "fe02a8c1e025995e853097b5e676eb2942e153ce38779f2d36dade60a8394a94", "sha1": "55a0012ba0176347da8a8f1f71e0279635fe65b6", "md5": "e85cd60e102bef7c393aeb156ff23237", "name": "perf", "size": 22704880, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/acpidbg", "sha256": "f5f37161d022ecd4c808b9d3ac0f73215ec959990c407551468d88294a74b82a", "sha1": "1967ead0da57dc52cb9f00c29cbdbbc92b3bbf62", "md5": "128852ba89f9f7688b85b5ce8c522e9f", "name": "acpidbg", "size": 934280, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/bpftool", "sha256": "d40a3b4e2b2fafbbc204efb221e99cb68f59208db2c78bdc8d429d595d82485f", "sha1": "e234bb6c564762b08bfbaddc59865da357f94138", "md5": "aba836a7651956212faae6aa9d66cbc2", "name": "bpftool", "size": 1709568, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/usbipd", "sha256": "d88c1db001d73904ff033549139559d97e85b4225f3596645d9992997a803f76", "sha1": "6b7f49a2a7e8af64b7fae6b7e090cb51091e4130", "md5": "4bf7193d9a4ab6c39ac198b9c6b96e98", "name": "usbipd", "size": 249352, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-5.17-tools-5.17.0-1009/x86_energy_perf_policy", "sha256": "27d0e0a58e8d8f4bf819a8f39cecc1f4c119d650ca63f953a82b8fb7cd223543", "sha1": "79cfe5ce21f4faffa5dbeec48df78cd6888e175b", "md5": "b22454323232ae918c7ea0cc55df6557", "name": "x86_energy_perf_policy", "size": 46608, "description": null, "package": 3755552, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-02T02:43:38+00:00", "updated_at": "2022-06-02T02:43:38+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-1205", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:39:23+00:00", "updated_at": "2022-09-16T16:39:23+00:00" }, { "name": "CVE-2022-32250", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:53:45+00:00", "updated_at": "2022-09-16T16:53:45+00:00" }, { "name": "CVE-2022-21499", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:54:34+00:00", "updated_at": "2022-09-16T16:54:34+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:54:36+00:00", "updated_at": "2022-09-16T16:54:36+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:55:19+00:00", "updated_at": "2022-09-16T16:55:19+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T16:57:07+00:00", "updated_at": "2022-09-16T16:57:07+00:00" }, { "name": "CVE-2022-1943", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:11:19+00:00", "updated_at": "2022-09-16T17:11:19+00:00" }, { "name": "CVE-2022-1734", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:11:49+00:00", "updated_at": "2022-09-16T17:11:49+00:00" }, { "name": "CVE-2022-2078", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:13:43+00:00", "updated_at": "2022-09-16T17:13:43+00:00" }, { "name": "CVE-2022-1972", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:15:30+00:00", "updated_at": "2022-09-16T17:15:30+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:16:24+00:00", "updated_at": "2022-09-16T17:16:24+00:00" }, { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-16T17:21:11+00:00", "updated_at": "2022-09-16T17:21:11+00:00" }, { "name": "CVE-2022-29968", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2022-09-18T22:53:43+00:00", "updated_at": "2022-09-18T22:53:43+00:00" }, { "name": "CVE-2022-2639", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-02-18T11:25:02+00:00", "updated_at": "2023-02-18T11:25:02+00:00" }, { "name": "CVE-2022-3526", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-02-18T11:40:18+00:00", "updated_at": "2023-02-18T11:40:18+00:00" }, { "name": "CVE-2022-41858", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-02-18T11:42:55+00:00", "updated_at": "2023-02-18T11:42:55+00:00" }, { "name": "CVE-2023-20938", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-03-07T12:09:55+00:00", "updated_at": "2023-03-07T12:09:55+00:00" }, { "name": "CVE-2023-3439", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-07-12T09:57:58+00:00", "updated_at": "2023-07-12T09:57:58+00:00" }, { "name": "CVE-2023-3159", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-07-12T10:06:21+00:00", "updated_at": "2023-07-12T10:06:21+00:00" }, { "name": "CVE-2023-4389", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "be8a15e165aa8211f7755cef45bf5e1ea7cccf1c5969ac5181291d877baca1e3", "name": "linux-oem-5.17-tools-host", "version": "5.17.0-1011.12", "filename": "linux-oem-5.17-tools-host_5.17.0-1011.12_all.deb" }, "created_at": "2023-09-13T10:28:03+00:00", "updated_at": "2023-09-13T10:28:03+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-06-01T23:03:54+00:00", "updated_at": "2022-06-02T01:43:37+00:00", "deleted_at": null }