164b50290eb0497e13459fe510fcf9d07bb3d46de26724618b7368aa9aea4f71
dc735ee4254fa4dd8a8f0b0100a47cd076406d25
3b5ae0a1f706fe775e43ec91c0a95812
4.9.168-1+deb9u4
linux-cpupower_4.9.168-1+deb9u4_amd64.deb
843
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 10552 | 0 | ||
turbostat /usr/sbin/turbostat | 69432 | 0 | ||
cpupower /usr/bin/cpupower | 59872 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2015-8553 | 65 | DSA DSA-4497-1 | |
CVE-2017-18509 | 78 | DSA DSA-4497-1 | |
CVE-2018-5995 | 55 | DSA DSA-4497-1 | |
CVE-2018-20836 | 93 | DSA DSA-4497-1 | |
CVE-2018-20856 | 78 | DSA DSA-4497-1 | |
CVE-2019-1125 | 55 | DSA DSA-4497-1 | |
CVE-2019-3882 | 55 | DSA DSA-4497-1 | |
CVE-2019-3900 | 77 | DSA DSA-4497-1 | |
CVE-2019-10207 | 55 | DSA DSA-4497-1 | |
CVE-2019-10638 | 65 | DSA DSA-4497-1 | |
CVE-2019-10639 | 75 | DSA DSA-4497-1 | |
CVE-2019-13631 | 68 | DSA DSA-4497-1 | |
CVE-2019-13648 | 55 | DSA DSA-4497-1 | |
CVE-2019-14283 | 68 | DSA DSA-4497-1 | |
CVE-2019-14284 | 62 | DSA DSA-4497-1 | |
CVE-2019-15239 | 78 | DSA DSA-4497-1 | |
CVE-2015-8553 | 65 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2017-18509 | 78 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2018-5995 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2018-20836 | 93 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2018-20856 | 78 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-1125 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-3882 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-3900 | 77 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-10207 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-10638 | 65 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-10639 | 75 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-13631 | 68 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-13648 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-14283 | 68 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-14284 | 62 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-15239 | 78 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
{ "sha256": "164b50290eb0497e13459fe510fcf9d07bb3d46de26724618b7368aa9aea4f71", "sha1": "dc735ee4254fa4dd8a8f0b0100a47cd076406d25", "md5": "3b5ae0a1f706fe775e43ec91c0a95812", "type": "DEB", "arch": "AMD64", "name": "linux-cpupower", "filename": "linux-cpupower_4.9.168-1+deb9u4_amd64.deb", "size": 843, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.9.168-1+deb9u4", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "ba01bd4f8118b86bb8a98a85aaea92737641b2af49006df47a94ccf6674d425a", "sha1": "de453cfadfcf6b33ee65a2085d2aa5915bacfd02", "md5": "882c69b563d74d4334225ccda84a1942", "name": "x86_energy_perf_policy", "size": 10552, "description": null, "package": 1074877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:00:16+00:00", "updated_at": "2021-03-09T02:00:16+00:00", "deleted_at": null }, { "path": "/usr/sbin/turbostat", "sha256": "5ee01e23e4a652dd8c81b0568b5df02a34c4ed6fa800d91dbda0fedbf3b6eeb1", "sha1": "e7654b165f4d1614e7571eede89e88b1d054c344", "md5": "e2a7c41b68faa7df9d0a0816c53b5e40", "name": "turbostat", "size": 69432, "description": null, "package": 1074877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:00:16+00:00", "updated_at": "2021-03-09T02:00:16+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "cfc3de76f4e7b6d395a7e60c4fb37f448d54fbea81c0dbe238be9f3bacef3929", "sha1": "4617f1105497bed17b4c5a0ccf46f99d1e3957e6", "md5": "45cf63786bfa85b43265625ec4cda090", "name": "cpupower", "size": 59872, "description": null, "package": 1074877, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:00:16+00:00", "updated_at": "2021-03-09T02:00:16+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2015-8553", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:09:57+00:00", "updated_at": "2021-03-09T08:09:57+00:00" }, { "name": "CVE-2017-18509", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:09:58+00:00", "updated_at": "2021-03-09T08:09:58+00:00" }, { "name": "CVE-2018-5995", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:00+00:00", "updated_at": "2021-03-09T08:10:00+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:01+00:00", "updated_at": "2021-03-09T08:10:01+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:02+00:00", "updated_at": "2021-03-09T08:10:02+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:03+00:00", "updated_at": "2021-03-09T08:10:03+00:00" }, { "name": "CVE-2019-3882", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:04+00:00", "updated_at": "2021-03-09T08:10:04+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:05+00:00", "updated_at": "2021-03-09T08:10:05+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:06+00:00", "updated_at": "2021-03-09T08:10:06+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:07+00:00", "updated_at": "2021-03-09T08:10:07+00:00" }, { "name": "CVE-2019-10639", "risk": 75, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:08+00:00", "updated_at": "2021-03-09T08:10:08+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:09+00:00", "updated_at": "2021-03-09T08:10:09+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:10+00:00", "updated_at": "2021-03-09T08:10:10+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:12+00:00", "updated_at": "2021-03-09T08:10:12+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:13+00:00", "updated_at": "2021-03-09T08:10:13+00:00" }, { "name": "CVE-2019-15239", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:14+00:00", "updated_at": "2021-03-09T08:10:14+00:00" }, { "name": "CVE-2015-8553", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:46+00:00", "updated_at": "2021-07-19T14:00:46+00:00" }, { "name": "CVE-2017-18509", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:47+00:00", "updated_at": "2021-07-19T14:00:47+00:00" }, { "name": "CVE-2018-5995", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:47+00:00", "updated_at": "2021-07-19T14:00:47+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:48+00:00", "updated_at": "2021-07-19T14:00:48+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:48+00:00", "updated_at": "2021-07-19T14:00:48+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:49+00:00", "updated_at": "2021-07-19T14:00:49+00:00" }, { "name": "CVE-2019-3882", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:49+00:00", "updated_at": "2021-07-19T14:00:49+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:50+00:00", "updated_at": "2021-07-19T14:00:50+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:50+00:00", "updated_at": "2021-07-19T14:00:50+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:50+00:00", "updated_at": "2021-07-19T14:00:50+00:00" }, { "name": "CVE-2019-10639", "risk": 75, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:51+00:00", "updated_at": "2021-07-19T14:00:51+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:51+00:00", "updated_at": "2021-07-19T14:00:51+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:52+00:00", "updated_at": "2021-07-19T14:00:52+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:52+00:00", "updated_at": "2021-07-19T14:00:52+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:53+00:00", "updated_at": "2021-07-19T14:00:53+00:00" }, { "name": "CVE-2019-15239", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "4b526c0fdd57c81c2d4018af46ee5888af2b6830c65654ddb4d1b301134e8a4b", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_amd64.deb" }, "created_at": "2021-07-19T14:00:53+00:00", "updated_at": "2021-07-19T14:00:53+00:00" } ], "risk": 93, "vulnerable": 93, "outdated": 0, "malicious": 0, "created_at": "2019-07-20T15:19:45+00:00", "updated_at": "2021-03-09T02:00:16+00:00", "deleted_at": null }