Zercurity data services
  • Summary
  • Applications (10)
  • Packages (0)
  • Vulnerabilities (19)

linux-oem-6.0-tools-6.0.0-1011

Hashes
Linux kernel version specific tools for version 6.0.0-1011 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 6.0.0-1011 on 64 bit x86. You probably want to install linux-tools-6.0.0-1011-<flavour>.
  • SHA256: e8df1d4068f1f9634fbe86d0c6874c1c09ce309626342d89b636ea97fabf6dd0
  • SHA1: c6a26b12b8a3d8363f9fed42a2f0076ded8f5c84
  • MD5: fcf850245e63e1ae623b22423fa91446
Information
  • Version: 6.0.0-1011.11
  • Filename: linux-oem-6.0-tools-6.0.0-1011_6.0.0-1011.11_amd64.deb
  • Size: 27368
  • Type: DEB
  • Source: linux-oem-6.0
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.6.0.0-1011
/usr/lib/libcpupower.so.6.0.0-1011
849040
usbip
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbip
2489520
libperf-jvmti.so
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/libperf-jvmti.so
2165040
turbostat
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/turbostat
1484320
cpupower
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/cpupower
2991840
perf
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/perf
237135120
acpidbg
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/acpidbg
9342800
bpftool
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/bpftool
17636480
usbipd
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbipd
2493520
x86_energy_perf_policy
/usr/lib/linux-oem-6.0-tools-6.0.0-1011/x86_energy_perf_policy
466160

Vulnerabilities

Raw Object

{
  "sha256": "e8df1d4068f1f9634fbe86d0c6874c1c09ce309626342d89b636ea97fabf6dd0",
  "sha1": "c6a26b12b8a3d8363f9fed42a2f0076ded8f5c84",
  "md5": "fcf850245e63e1ae623b22423fa91446",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-oem-6.0-tools-6.0.0-1011",
  "filename": "linux-oem-6.0-tools-6.0.0-1011_6.0.0-1011.11_amd64.deb",
  "size": 27368,
  "description": "Linux kernel version specific tools for version 6.0.0-1011\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 6.0.0-1011 on\n64 bit x86.\nYou probably want to install linux-tools-6.0.0-1011-<flavour>.",
  "url": null,
  "version": "6.0.0-1011.11",
  "source": "linux-oem-6.0",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.6.0.0-1011",
      "sha256": "5cb650e2fc869abc82f3e958414d0746a63ab223d296a1097f8b329b59a06f22",
      "sha1": "c273e3a1b4f488dc5ca61aa0e5fa8696ba4e1275",
      "md5": "7697bd8104e181681dcb6ff6334a0fa4",
      "name": "libcpupower.so.6.0.0-1011",
      "size": 84904,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:31+00:00",
      "updated_at": "2023-02-11T12:02:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbip",
      "sha256": "8b39517a22849abb5ce0379917772e5152af2b6350e19162e905f5a7dcee9f78",
      "sha1": "43d6d4c211aed59c05ae66f25ffed45d3ceae36f",
      "md5": "6e2275c2287cc917847f2688a77cacb7",
      "name": "usbip",
      "size": 248952,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:31+00:00",
      "updated_at": "2023-02-11T12:02:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/libperf-jvmti.so",
      "sha256": "ffe528096813db7272578551cf8499678994f3e3194f0cdaddd0e7b4a333f060",
      "sha1": "0b53f9082915d1b2ca4a218edd5e458d4585eb0b",
      "md5": "57cc963d42efa84131755ccbf6b611b9",
      "name": "libperf-jvmti.so",
      "size": 216504,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:31+00:00",
      "updated_at": "2023-02-11T12:02:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/turbostat",
      "sha256": "976afa574ded94fdbd64278df05d2eec2f21c9a2f9073abf24c2f694f8d8bbc7",
      "sha1": "57880d512f259bf234a13bb38a11bf58c5084f09",
      "md5": "085c10dba3268820e00a2accf0d7ccb8",
      "name": "turbostat",
      "size": 148432,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:31+00:00",
      "updated_at": "2023-02-11T12:02:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/cpupower",
      "sha256": "2bf2940a9593f990c5689a7fd675efc4c95fa62d4ece4bc03cb25bf4d56d7640",
      "sha1": "3af375d1ab1ffa6a2b55858836392ae223c2ef8c",
      "md5": "8689f8afb9acf30274303310fcefbb30",
      "name": "cpupower",
      "size": 299184,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:31+00:00",
      "updated_at": "2023-02-11T12:02:31+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/perf",
      "sha256": "94136559615585e9e0057a5aa40a0e7e1ede317eeeab39a5db64d83e867b445a",
      "sha1": "901fb311c63f49f2d801e24be31c85a716410069",
      "md5": "d7d47668a62605ecc68a0d2372d51e2c",
      "name": "perf",
      "size": 23713512,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:32+00:00",
      "updated_at": "2023-02-11T12:02:32+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/acpidbg",
      "sha256": "41c773cb8b3f97125ef9423997c4d95f2c4936e8b0594ff5b70e85e3876ec540",
      "sha1": "1c76d978012b22da52e9964c284e09ec1b2963c0",
      "md5": "f10afd6d8a15149a27183c49c1a4b12a",
      "name": "acpidbg",
      "size": 934280,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:32+00:00",
      "updated_at": "2023-02-11T12:02:32+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/bpftool",
      "sha256": "bd1c6a4d9f33ee2977338755452c6c4aa7659092d63580b5be3b8b938b20324d",
      "sha1": "19fee767df3bf824255827def6758a2050ded938",
      "md5": "8d34264421cccff4278a775d9adf8d4f",
      "name": "bpftool",
      "size": 1763648,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:32+00:00",
      "updated_at": "2023-02-11T12:02:32+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbipd",
      "sha256": "300b730c1f32e0e52a4c796d59b1082033330cd298c14065d259c99c0f437d11",
      "sha1": "e1a4bb32c4de1318662e8178f8d568d88fe397fc",
      "md5": "3347bdf7efc7f61f93a2db2ca37fd862",
      "name": "usbipd",
      "size": 249352,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:32+00:00",
      "updated_at": "2023-02-11T12:02:32+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/x86_energy_perf_policy",
      "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643",
      "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5",
      "md5": "e9d52e1dde799b718aef361de0e9b299",
      "name": "x86_energy_perf_policy",
      "size": 46616,
      "description": null,
      "package": 5134123,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-11T12:02:32+00:00",
      "updated_at": "2023-02-11T12:02:32+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:32:53+00:00",
      "updated_at": "2023-03-03T10:32:53+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:38:29+00:00",
      "updated_at": "2023-03-03T10:38:29+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:49:49+00:00",
      "updated_at": "2023-03-03T10:49:49+00:00"
    },
    {
      "name": "CVE-2023-0461",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:51:26+00:00",
      "updated_at": "2023-03-03T10:51:26+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:54:22+00:00",
      "updated_at": "2023-03-03T10:54:22+00:00"
    },
    {
      "name": "CVE-2023-0469",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T10:54:23+00:00",
      "updated_at": "2023-03-03T10:54:23+00:00"
    },
    {
      "name": "CVE-2022-4379",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:18:27+00:00",
      "updated_at": "2023-03-03T11:18:27+00:00"
    },
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:18:32+00:00",
      "updated_at": "2023-03-03T11:18:32+00:00"
    },
    {
      "name": "CVE-2022-47520",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-03T11:18:36+00:00",
      "updated_at": "2023-03-03T11:18:36+00:00"
    },
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T10:40:40+00:00",
      "updated_at": "2023-03-04T10:40:40+00:00"
    },
    {
      "name": "CVE-2023-0461",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T10:46:04+00:00",
      "updated_at": "2023-03-04T10:46:04+00:00"
    },
    {
      "name": "CVE-2023-0469",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T10:47:15+00:00",
      "updated_at": "2023-03-04T10:47:15+00:00"
    },
    {
      "name": "CVE-2022-4379",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T10:47:26+00:00",
      "updated_at": "2023-03-04T10:47:26+00:00"
    },
    {
      "name": "CVE-2022-47520",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T10:48:13+00:00",
      "updated_at": "2023-03-04T10:48:13+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T10:48:42+00:00",
      "updated_at": "2023-03-04T10:48:42+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T10:59:05+00:00",
      "updated_at": "2023-03-04T10:59:05+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T11:09:50+00:00",
      "updated_at": "2023-03-04T11:09:50+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-03-04T11:11:32+00:00",
      "updated_at": "2023-03-04T11:11:32+00:00"
    },
    {
      "name": "CVE-2023-2236",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec",
        "name": "linux-oem-6.0-tools-host",
        "version": "6.0.0-1012.12",
        "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb"
      },
      "created_at": "2023-06-06T10:21:38+00:00",
      "updated_at": "2023-06-06T10:21:38+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2023-01-24T18:04:08+00:00",
  "updated_at": "2023-02-11T12:02:31+00:00",
  "deleted_at": null
}