fe93ff8dc42cd65c4137ace0d7650f9a2ea61e9aae6da9c335211054af79452f
87f528108ea242b44cfecdefadd390d8e7749167
7dd1ad42a1f8b7d8b81c61c45a0d8fca
5.4.0-1068.71
linux-gke-tools-5.4.0-1068_5.4.0-1068.71_amd64.deb
23273
DEB
linux-gke
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.5.4.0-1068 /usr/lib/libcpupower.so.5.4.0-1068 | 97800 | 0 | ||
usbip /usr/lib/linux-gke-tools-5.4.0-1068/usbip | 300504 | 0 | ||
turbostat /usr/lib/linux-gke-tools-5.4.0-1068/turbostat | 134424 | 0 | ||
cpupower /usr/lib/linux-gke-tools-5.4.0-1068/cpupower | 337952 | 0 | ||
perf /usr/lib/linux-gke-tools-5.4.0-1068/perf | 21826320 | 0 | ||
bpftool /usr/lib/linux-gke-tools-5.4.0-1068/bpftool | 552368 | 0 | ||
usbipd /usr/lib/linux-gke-tools-5.4.0-1068/usbipd | 297120 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-gke-tools-5.4.0-1068/x86_energy_perf_policy | 38544 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-26490 | 78 | USN | |
CVE-2022-20008 | 46 | USN | |
CVE-2022-1016 | 0 | USN | |
CVE-2022-25375 | 55 | USN | |
CVE-2020-27820 | 47 | USN | |
CVE-2021-26401 | 56 | USN | |
CVE-2022-27223 | 88 | USN | |
CVE-2022-25258 | 0 | USN | |
CVE-2022-20009 | 72 | USN | |
CVE-2022-0487 | 55 | USN | |
CVE-2022-2964 | 78 | USN |
{ "sha256": "fe93ff8dc42cd65c4137ace0d7650f9a2ea61e9aae6da9c335211054af79452f", "sha1": "87f528108ea242b44cfecdefadd390d8e7749167", "md5": "7dd1ad42a1f8b7d8b81c61c45a0d8fca", "type": "DEB", "arch": "AMD64", "name": "linux-gke-tools-5.4.0-1068", "filename": "linux-gke-tools-5.4.0-1068_5.4.0-1068.71_amd64.deb", "size": 23273, "description": "Linux kernel version specific tools for version 5.4.0-1068\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 5.4.0-1068 on\n64 bit x86.\nYou probably want to install linux-tools-5.4.0-1068-<flavour>.", "url": null, "version": "5.4.0-1068.71", "source": "linux-gke", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libc6 (>= 2.28), libcap2 (>= 1:2.10), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.5.4.0-1068", "sha256": "65ff3b34302a0be129eb926539a4e87206e672cad2a3492a45c44adecd052799", "sha1": "6442536c1faaa9be53400717f565c1020f953076", "md5": "974f3c50e0a24d3c5455433c3282d17f", "name": "libcpupower.so.5.4.0-1068", "size": 97800, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:30+00:00", "updated_at": "2022-04-13T02:27:30+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1068/usbip", "sha256": "7052753aebebe743cfaa2e4734761c38dbe210d24f0e7a4b153f2d2f9674869f", "sha1": "3e892697877cbd096579ca626e1091dafca0e609", "md5": "ca8c2e0f70d1decf1ca12da163560506", "name": "usbip", "size": 300504, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:31+00:00", "updated_at": "2022-04-13T02:27:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1068/turbostat", "sha256": "4a5bcf5bb7b62caf1349d43f14ca7fbd5e096ce342310be5cb46362f4c3e6785", "sha1": "b06e6619067900455abcbbf5cbdedf42d7423846", "md5": "3dca491f8622de5e10e9125e01b85e3e", "name": "turbostat", "size": 134424, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:31+00:00", "updated_at": "2022-04-13T02:27:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1068/cpupower", "sha256": "c0edef3926ef1442e9f6193d0d63ff9b4aae86f190444a3d67fb9c38ffab80a8", "sha1": "9ce92ca3144fa1b755bd451066b9aeb06472d0ad", "md5": "94651af230e3c6b02bf5d02b59026b41", "name": "cpupower", "size": 337952, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:31+00:00", "updated_at": "2022-04-13T02:27:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1068/perf", "sha256": "59a46fea7da85c321dc68f5a7990ce7bb64b59dd367d56c46e15118e9c6a3182", "sha1": "727be6e82faaa40840cd5616fa337fddcddd4d7d", "md5": "ff1e8214f1dc0b0369e8443c0a872c10", "name": "perf", "size": 21826320, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:31+00:00", "updated_at": "2022-04-13T02:27:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1068/bpftool", "sha256": "4186eb0e7e4c4bd3300b795017e1bdd08495c7d19d1767c73326185f5a2a1f8f", "sha1": "ef92fd71263bcbf30c181c5b3fc6cc3e2f4d8561", "md5": "6a1f2695a84a04013c8322c58411cc24", "name": "bpftool", "size": 552368, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:31+00:00", "updated_at": "2022-04-13T02:27:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1068/usbipd", "sha256": "19a06323eee0e74d735f95314937d735d991f1c5c2f7c6706d875172f96c3c22", "sha1": "ab4bf09d763c5e0ce0266fd36778aca8dac350dd", "md5": "20516740482829c6f501f316c3ecd129", "name": "usbipd", "size": 297120, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:31+00:00", "updated_at": "2022-04-13T02:27:31+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-gke-tools-5.4.0-1068/x86_energy_perf_policy", "sha256": "63f47cf708201f8c7fe9719a47fd82259bea8b2fc852e7af5277ad137f8d764c", "sha1": "63639c2f6978e4cc004a9723fcf7be2b8a9618ef", "md5": "7c9b433e1e46348ab6c9d1f4633dc4d3", "name": "x86_energy_perf_policy", "size": 38544, "description": null, "package": 3651836, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-04-13T02:27:31+00:00", "updated_at": "2022-04-13T02:27:31+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-26490", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T02:33:41+00:00", "updated_at": "2022-05-13T02:33:41+00:00" }, { "name": "CVE-2022-20008", "risk": 46, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T02:35:28+00:00", "updated_at": "2022-05-13T02:35:28+00:00" }, { "name": "CVE-2022-1016", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T02:36:25+00:00", "updated_at": "2022-05-13T02:36:25+00:00" }, { "name": "CVE-2022-25375", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T02:44:41+00:00", "updated_at": "2022-05-13T02:44:41+00:00" }, { "name": "CVE-2020-27820", "risk": 47, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T02:46:01+00:00", "updated_at": "2022-05-13T02:46:01+00:00" }, { "name": "CVE-2021-26401", "risk": 56, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T02:50:21+00:00", "updated_at": "2022-05-13T02:50:21+00:00" }, { "name": "CVE-2022-27223", "risk": 88, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T02:51:46+00:00", "updated_at": "2022-05-13T02:51:46+00:00" }, { "name": "CVE-2022-25258", "risk": 0, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-05-13T03:13:47+00:00", "updated_at": "2022-05-13T03:13:47+00:00" }, { "name": "CVE-2022-20009", "risk": 72, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-28T02:42:42+00:00", "updated_at": "2022-07-28T02:42:42+00:00" }, { "name": "CVE-2022-0487", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2022-07-28T03:08:55+00:00", "updated_at": "2022-07-28T03:08:55+00:00" }, { "name": "CVE-2022-2964", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-02-15T11:52:01+00:00", "updated_at": "2023-02-15T11:52:01+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-04-08T04:17:11+00:00", "updated_at": "2022-04-13T01:27:29+00:00", "deleted_at": null }