e8df1d4068f1f9634fbe86d0c6874c1c09ce309626342d89b636ea97fabf6dd0
c6a26b12b8a3d8363f9fed42a2f0076ded8f5c84
fcf850245e63e1ae623b22423fa91446
6.0.0-1011.11
linux-oem-6.0-tools-6.0.0-1011_6.0.0-1011.11_amd64.deb
27368
DEB
linux-oem-6.0
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.6.0.0-1011 /usr/lib/libcpupower.so.6.0.0-1011 | 84904 | 0 | ||
usbip /usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbip | 248952 | 0 | ||
libperf-jvmti.so /usr/lib/linux-oem-6.0-tools-6.0.0-1011/libperf-jvmti.so | 216504 | 0 | ||
turbostat /usr/lib/linux-oem-6.0-tools-6.0.0-1011/turbostat | 148432 | 0 | ||
cpupower /usr/lib/linux-oem-6.0-tools-6.0.0-1011/cpupower | 299184 | 0 | ||
perf /usr/lib/linux-oem-6.0-tools-6.0.0-1011/perf | 23713512 | 0 | ||
acpidbg /usr/lib/linux-oem-6.0-tools-6.0.0-1011/acpidbg | 934280 | 0 | ||
bpftool /usr/lib/linux-oem-6.0-tools-6.0.0-1011/bpftool | 1763648 | 0 | ||
usbipd /usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbipd | 249352 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-oem-6.0-tools-6.0.0-1011/x86_energy_perf_policy | 46616 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-43945 | 8 | USN | |
CVE-2022-42896 | 9 | USN | |
CVE-2022-45934 | 8 | USN | |
CVE-2023-0461 | 0 | USN | |
CVE-2022-3567 | 71 | USN | |
CVE-2023-0469 | 6 | USN | |
CVE-2022-4379 | 8 | USN | |
CVE-2023-0045 | 0 | USN | |
CVE-2022-47520 | 7 | USN | |
CVE-2023-0045 | 0 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2023-0461 | 0 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2023-0469 | 6 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2022-4379 | 8 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2022-47520 | 7 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2022-45934 | 8 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2022-43945 | 8 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2022-3567 | 71 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2022-42896 | 9 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
CVE-2023-2236 | 8 | USN | linux-oem-6.0-tools-host 6.0.0-1012.12 |
{ "sha256": "e8df1d4068f1f9634fbe86d0c6874c1c09ce309626342d89b636ea97fabf6dd0", "sha1": "c6a26b12b8a3d8363f9fed42a2f0076ded8f5c84", "md5": "fcf850245e63e1ae623b22423fa91446", "type": "DEB", "arch": "AMD64", "name": "linux-oem-6.0-tools-6.0.0-1011", "filename": "linux-oem-6.0-tools-6.0.0-1011_6.0.0-1011.11_amd64.deb", "size": 27368, "description": "Linux kernel version specific tools for version 6.0.0-1011\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 6.0.0-1011 on\n64 bit x86.\nYou probably want to install linux-tools-6.0.0-1011-<flavour>.", "url": null, "version": "6.0.0-1011.11", "source": "linux-oem-6.0", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.34), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libssl3 (>= 3.0.0~~alpha1), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.2.3.3), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.6.0.0-1011", "sha256": "5cb650e2fc869abc82f3e958414d0746a63ab223d296a1097f8b329b59a06f22", "sha1": "c273e3a1b4f488dc5ca61aa0e5fa8696ba4e1275", "md5": "7697bd8104e181681dcb6ff6334a0fa4", "name": "libcpupower.so.6.0.0-1011", "size": 84904, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:31+00:00", "updated_at": "2023-02-11T12:02:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbip", "sha256": "8b39517a22849abb5ce0379917772e5152af2b6350e19162e905f5a7dcee9f78", "sha1": "43d6d4c211aed59c05ae66f25ffed45d3ceae36f", "md5": "6e2275c2287cc917847f2688a77cacb7", "name": "usbip", "size": 248952, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:31+00:00", "updated_at": "2023-02-11T12:02:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/libperf-jvmti.so", "sha256": "ffe528096813db7272578551cf8499678994f3e3194f0cdaddd0e7b4a333f060", "sha1": "0b53f9082915d1b2ca4a218edd5e458d4585eb0b", "md5": "57cc963d42efa84131755ccbf6b611b9", "name": "libperf-jvmti.so", "size": 216504, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:31+00:00", "updated_at": "2023-02-11T12:02:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/turbostat", "sha256": "976afa574ded94fdbd64278df05d2eec2f21c9a2f9073abf24c2f694f8d8bbc7", "sha1": "57880d512f259bf234a13bb38a11bf58c5084f09", "md5": "085c10dba3268820e00a2accf0d7ccb8", "name": "turbostat", "size": 148432, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:31+00:00", "updated_at": "2023-02-11T12:02:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/cpupower", "sha256": "2bf2940a9593f990c5689a7fd675efc4c95fa62d4ece4bc03cb25bf4d56d7640", "sha1": "3af375d1ab1ffa6a2b55858836392ae223c2ef8c", "md5": "8689f8afb9acf30274303310fcefbb30", "name": "cpupower", "size": 299184, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:31+00:00", "updated_at": "2023-02-11T12:02:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/perf", "sha256": "94136559615585e9e0057a5aa40a0e7e1ede317eeeab39a5db64d83e867b445a", "sha1": "901fb311c63f49f2d801e24be31c85a716410069", "md5": "d7d47668a62605ecc68a0d2372d51e2c", "name": "perf", "size": 23713512, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:32+00:00", "updated_at": "2023-02-11T12:02:32+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/acpidbg", "sha256": "41c773cb8b3f97125ef9423997c4d95f2c4936e8b0594ff5b70e85e3876ec540", "sha1": "1c76d978012b22da52e9964c284e09ec1b2963c0", "md5": "f10afd6d8a15149a27183c49c1a4b12a", "name": "acpidbg", "size": 934280, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:32+00:00", "updated_at": "2023-02-11T12:02:32+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/bpftool", "sha256": "bd1c6a4d9f33ee2977338755452c6c4aa7659092d63580b5be3b8b938b20324d", "sha1": "19fee767df3bf824255827def6758a2050ded938", "md5": "8d34264421cccff4278a775d9adf8d4f", "name": "bpftool", "size": 1763648, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:32+00:00", "updated_at": "2023-02-11T12:02:32+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/usbipd", "sha256": "300b730c1f32e0e52a4c796d59b1082033330cd298c14065d259c99c0f437d11", "sha1": "e1a4bb32c4de1318662e8178f8d568d88fe397fc", "md5": "3347bdf7efc7f61f93a2db2ca37fd862", "name": "usbipd", "size": 249352, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:32+00:00", "updated_at": "2023-02-11T12:02:32+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-oem-6.0-tools-6.0.0-1011/x86_energy_perf_policy", "sha256": "7a738f6130ff8a062ec6e3e7b436f4b12b5d757db6e9793e9661cfe0c9cd3643", "sha1": "a073c6bdbc8c41b203bd46d217de9a61b3b4e2e5", "md5": "e9d52e1dde799b718aef361de0e9b299", "name": "x86_energy_perf_policy", "size": 46616, "description": null, "package": 5134123, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-11T12:02:32+00:00", "updated_at": "2023-02-11T12:02:32+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T10:32:53+00:00", "updated_at": "2023-03-03T10:32:53+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T10:38:29+00:00", "updated_at": "2023-03-03T10:38:29+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T10:49:49+00:00", "updated_at": "2023-03-03T10:49:49+00:00" }, { "name": "CVE-2023-0461", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T10:51:26+00:00", "updated_at": "2023-03-03T10:51:26+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T10:54:22+00:00", "updated_at": "2023-03-03T10:54:22+00:00" }, { "name": "CVE-2023-0469", "risk": 6, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T10:54:23+00:00", "updated_at": "2023-03-03T10:54:23+00:00" }, { "name": "CVE-2022-4379", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T11:18:27+00:00", "updated_at": "2023-03-03T11:18:27+00:00" }, { "name": "CVE-2023-0045", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T11:18:32+00:00", "updated_at": "2023-03-03T11:18:32+00:00" }, { "name": "CVE-2022-47520", "risk": 7, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-03-03T11:18:36+00:00", "updated_at": "2023-03-03T11:18:36+00:00" }, { "name": "CVE-2023-0045", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T10:40:40+00:00", "updated_at": "2023-03-04T10:40:40+00:00" }, { "name": "CVE-2023-0461", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T10:46:04+00:00", "updated_at": "2023-03-04T10:46:04+00:00" }, { "name": "CVE-2023-0469", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T10:47:15+00:00", "updated_at": "2023-03-04T10:47:15+00:00" }, { "name": "CVE-2022-4379", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T10:47:26+00:00", "updated_at": "2023-03-04T10:47:26+00:00" }, { "name": "CVE-2022-47520", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T10:48:13+00:00", "updated_at": "2023-03-04T10:48:13+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T10:48:42+00:00", "updated_at": "2023-03-04T10:48:42+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T10:59:05+00:00", "updated_at": "2023-03-04T10:59:05+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T11:09:50+00:00", "updated_at": "2023-03-04T11:09:50+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-03-04T11:11:32+00:00", "updated_at": "2023-03-04T11:11:32+00:00" }, { "name": "CVE-2023-2236", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "2d65cabf451be898952c374bda0edc74f4dc8c9fdf6b01eb7cc54dfb2d9fdcec", "name": "linux-oem-6.0-tools-host", "version": "6.0.0-1012.12", "filename": "linux-oem-6.0-tools-host_6.0.0-1012.12_all.deb" }, "created_at": "2023-06-06T10:21:38+00:00", "updated_at": "2023-06-06T10:21:38+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-24T18:04:08+00:00", "updated_at": "2023-02-11T12:02:31+00:00", "deleted_at": null }