164b70eac4c341a51f9ba20adb040166b9592267e7f3eba7aa6eba318935e729
4118f80879f04bf90a3b810214371b08ad2cbcf0
16420d8925992fef00ad3a2e57578410
5.10.127-1
libcpupower-dev_5.10.127-1_i386.deb
500
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libcpupower1 (= 5.10.127-1)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "164b70eac4c341a51f9ba20adb040166b9592267e7f3eba7aa6eba318935e729", "sha1": "4118f80879f04bf90a3b810214371b08ad2cbcf0", "md5": "16420d8925992fef00ad3a2e57578410", "type": "DEB", "arch": "I386", "name": "libcpupower-dev", "filename": "libcpupower-dev_5.10.127-1_i386.deb", "size": 500, "description": "CPU frequency and voltage scaling tools for Linux (development files)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package is needed to compile programs against libcpupower.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libcpupower1 (= 5.10.127-1)", "applications": [], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:15:54+00:00", "updated_at": "2022-07-27T20:15:54+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:27+00:00", "updated_at": "2022-07-27T20:16:27+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:00+00:00", "updated_at": "2022-07-27T20:17:00+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:31+00:00", "updated_at": "2022-07-27T20:17:31+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:03+00:00", "updated_at": "2022-07-27T20:18:03+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:33+00:00", "updated_at": "2022-07-27T20:18:33+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:05+00:00", "updated_at": "2022-07-27T20:19:05+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:36+00:00", "updated_at": "2022-07-27T20:19:36+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:20:08+00:00", "updated_at": "2022-07-27T20:20:08+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T06:37:52+00:00", "updated_at": "2022-07-02T02:00:34+00:00", "deleted_at": null }