e84c24dc3254aafb2a48f9e8d310247b0d08ff85d80d7bf0b834daf7e399c9d9
37efe909e7d4651ebfd58e3acace7bfdf13f5465
c9b1758daab816157e1c059a4f97dd5d
5.4.0-1069.73
linux-gkeop-tools-5.4.0-1069_5.4.0-1069.73_amd64.deb
24545
DEB
linux-gkeop
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1069 /usr/lib/libcpupower.so.5.4.0-1069 | 97800 | 0 | ||
usbip /usr/lib/linux-gkeop-tools-5.4.0-1069/usbip | 300512 | 0 | ||
libperf-jvmti.so /usr/lib/linux-gkeop-tools-5.4.0-1069/libperf-jvmti.so | 243264 | 0 | ||
turbostat /usr/lib/linux-gkeop-tools-5.4.0-1069/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gkeop-tools-5.4.0-1069/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gkeop-tools-5.4.0-1069/perf | 21851408 | 0 | ||
acpidbg /usr/lib/linux-gkeop-tools-5.4.0-1069/acpidbg | 914040 | 0 | ||
bpftool /usr/lib/linux-gkeop-tools-5.4.0-1069/bpftool | 552696 | 0 | ||
usbipd /usr/lib/linux-gkeop-tools-5.4.0-1069/usbipd | 297128 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gkeop-tools-5.4.0-1069/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-1998 | 0 | USN | |
CVE-2023-25012 | 5 | USN | |
CVE-2023-1077 | 8 | USN | |
CVE-2023-1079 | 7 | USN | |
CVE-2023-1859 | 0 | USN | |
CVE-2023-1670 | 0 | USN | |
CVE-2023-2985 | 0 | USN | |
CVE-2023-1076 | 0 | USN | |
CVE-2023-3220 | 6 | USN | |
CVE-2023-1998 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-1076 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-2985 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-1079 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-1859 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-1077 | 8 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-1670 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-3220 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
CVE-2023-25012 | 5 | USN | linux-gkeop-source-5.4.0 5.4.0-1071.75 |
{ "sha256": "e84c24dc3254aafb2a48f9e8d310247b0d08ff85d80d7bf0b834daf7e399c9d9", "sha1": "37efe909e7d4651ebfd58e3acace7bfdf13f5465", "md5": "c9b1758daab816157e1c059a4f97dd5d", "type": "DEB", "arch": "AMD64", "name": "linux-gkeop-tools-5.4.0-1069", "filename": "linux-gkeop-tools-5.4.0-1069_5.4.0-1069.73_amd64.deb", "size": 24545, "description": "Linux kernel version specific tools for version 5.4.0-1069\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1069 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1069-<flavour>.", "url": null, "version": "5.4.0-1069.73", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.30), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl1.1 (>= 1.1.0), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1069", "sha256": "7ec28de35c55d75b7d6f5a529916ca6972e2bb6601c0d2d4b4caac29382ac8fa", "sha1": "49e5431b14cb946a576814686242dfec3c3b6f75", "md5": "da054742d62016d1b71af1cb2814bf15", "name": "libcpupower.so.5.4.0-1069", "size": 97800, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/usbip", "sha256": "ddf865153fd8da8ff95fc843742623f8106d94502ac8aa578314898ab2d64402", "sha1": "0bd2e2ccb093f5bd6d26e4924a3db00cd18da4cc", "md5": "43ed1e6ff72aff58615600d04d9990ee", "name": "usbip", "size": 300512, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/libperf-jvmti.so", "sha256": "3f5ec5bcd86f94e8ef5ce6ccd6327b21cd2f700f56a3a8c2a8e886d5ce1505dd", "sha1": "99697af5f77aebd5594e4773f2920a7b090ac059", "md5": "3e5e49808fead6c104d495494c61d636", "name": "libperf-jvmti.so", "size": 243264, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/turbostat", "sha256": "94e74ceb20693d10e47ba177b7ca110976bc28547b518584b737af754626a27b", "sha1": "b4afb42a5255caac1b4d150a888a6103e62b5eda", "md5": "1d2310df8ba18ecc3bd9adfa1bca84f6", "name": "turbostat", "size": 134424, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/cpupower", "sha256": "70ec52cb95ef58dcc14b79ce9b26ea2bb4df2529f4694f0348e42cb1b878880f", "sha1": "d854205cb3343fb170ed86640de36d2880660afd", "md5": "b86f92e8facad2751b0cc38dd5b9c2ba", "name": "cpupower", "size": 337952, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/perf", "sha256": "1f81487c79faa22d218206b108ccba3803efa18ed8fb04299e876dab494e9c0b", "sha1": "ade1ea39c83a217b8d6b947507b8b26da04fc4d4", "md5": "1804accb1896b257f280afa8a2c81432", "name": "perf", "size": 21851408, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/acpidbg", "sha256": "8702c3961a7e2dbf63db02faeb0dd5fce205e74cd35981799fc2c270e1b86a9c", "sha1": "e677170b7753a5f80e363af75458323d5c638fe5", "md5": "ac385a5adc70fd17bb90ddb27743dc53", "name": "acpidbg", "size": 914040, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/bpftool", "sha256": "fcb9bb920c0f834b46028eef5cdc9ddebed9fd74a469f345a10e4d28497081b0", "sha1": "9434518502efff9165fa680ae9c8422c782b1f3f", "md5": "6325df0441fb2c9bafdeddaaf297119c", "name": "bpftool", "size": 552696, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/usbipd", "sha256": "4e3569b24e33fad2dd0e4595ff7c524eb9fa2217fe355675f5b6ef3ed7e2e2e4", "sha1": "ecf00d316aab0bc85e3001d2d9f380ca2a654e26", "md5": "73c94c714f137ffd9e0467099f357127", "name": "usbipd", "size": 297128, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gkeop-tools-5.4.0-1069/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 5260210, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-05-12T10:22:22+00:00", "updated_at": "2023-05-12T10:22:22+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2023-1998", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T10:45:47+00:00", "updated_at": "2023-06-23T10:45:47+00:00" }, { "name": "CVE-2023-25012", "risk": 5, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T10:59:40+00:00", "updated_at": "2023-06-23T10:59:40+00:00" }, { "name": "CVE-2023-1077", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T11:17:49+00:00", "updated_at": "2023-06-23T11:17:49+00:00" }, { "name": "CVE-2023-1079", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T11:30:11+00:00", "updated_at": "2023-06-23T11:30:11+00:00" }, { "name": "CVE-2023-1859", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T11:35:48+00:00", "updated_at": "2023-06-23T11:35:48+00:00" }, { "name": "CVE-2023-1670", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T12:02:05+00:00", "updated_at": "2023-06-23T12:02:05+00:00" }, { "name": "CVE-2023-2985", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T12:05:10+00:00", "updated_at": "2023-06-23T12:05:10+00:00" }, { "name": "CVE-2023-1076", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-06-23T12:47:50+00:00", "updated_at": "2023-06-23T12:47:50+00:00" }, { "name": "CVE-2023-3220", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-08-09T09:28:53+00:00", "updated_at": "2023-08-09T09:28:53+00:00" }, { "name": "CVE-2023-1998", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:32:56+00:00", "updated_at": "2023-09-06T09:32:56+00:00" }, { "name": "CVE-2023-1076", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:33:17+00:00", "updated_at": "2023-09-06T09:33:17+00:00" }, { "name": "CVE-2023-2985", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:33:25+00:00", "updated_at": "2023-09-06T09:33:25+00:00" }, { "name": "CVE-2023-1079", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:44:07+00:00", "updated_at": "2023-09-06T09:44:07+00:00" }, { "name": "CVE-2023-1859", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:44:15+00:00", "updated_at": "2023-09-06T09:44:15+00:00" }, { "name": "CVE-2023-1077", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:48:04+00:00", "updated_at": "2023-09-06T09:48:04+00:00" }, { "name": "CVE-2023-1670", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:49:46+00:00", "updated_at": "2023-09-06T09:49:46+00:00" }, { "name": "CVE-2023-3220", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:50:03+00:00", "updated_at": "2023-09-06T09:50:03+00:00" }, { "name": "CVE-2023-25012", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1071.75", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb" }, "created_at": "2023-09-06T09:50:25+00:00", "updated_at": "2023-09-06T09:50:25+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-05-01T01:32:09+00:00", "updated_at": "2023-05-12T09:22:21+00:00", "deleted_at": null }