1d7765bc5e976641e1fcf28c1b48b7c92266ea8bc5becdcc26bd63eca28be748
c37d27041b0b4e0b4f890a8e32daf0f0e2712616
eeee0b163bc9760998891198a745bedd
4.9.110-3+deb9u4
libcpupower1_4.9.110-3+deb9u4_i386.deb
583
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.4)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.1 /usr/lib/libcpupower.so.0.0.1 | 22024 | 0 | ||
libcpupower.so.1 /usr/lib/libcpupower.so.1 | 22024 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2018-6554 | 55 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-6555 | 78 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-7755 | 55 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-9363 | 84 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-9516 | 78 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-10902 | 78 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-10938 | 71 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-13099 | 55 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-14609 | 71 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-14617 | 71 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-14633 | 83 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-14678 | 78 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-14734 | 78 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-15572 | 65 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-15594 | 55 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-16276 | 78 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-16658 | 61 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
CVE-2018-17182 | 78 | DSA DSA-4308-1 | libcpupower1 4.9.110-3+deb9u5 |
{ "sha256": "1d7765bc5e976641e1fcf28c1b48b7c92266ea8bc5becdcc26bd63eca28be748", "sha1": "c37d27041b0b4e0b4f890a8e32daf0f0e2712616", "md5": "eeee0b163bc9760998891198a745bedd", "type": "DEB", "arch": "I386", "name": "libcpupower1", "filename": "libcpupower1_4.9.110-3+deb9u4_i386.deb", "size": 583, "description": "CPU frequency and voltage scaling tools for Linux (libraries)\nThis package contains the shared library.", "url": "https://www.kernel.org/", "version": "4.9.110-3+deb9u4", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.4)", "applications": [ { "path": "/usr/lib/libcpupower.so.0.0.1", "sha256": "de3e94961be7e9696de20f64b771ec4a806c500be586a8dcf775a5ce189d3fe4", "sha1": "3b0be9193751e48cfd775d660222641780886845", "md5": "c0afb485f3a7a480de38d25a900f165a", "name": "libcpupower.so.1", "size": 22024, "description": null, "package": 1006465, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T11:06:20+00:00", "updated_at": "2021-03-07T11:06:20+00:00", "deleted_at": null }, { "path": "/usr/lib/libcpupower.so.1", "sha256": "de3e94961be7e9696de20f64b771ec4a806c500be586a8dcf775a5ce189d3fe4", "sha1": "3b0be9193751e48cfd775d660222641780886845", "md5": "c0afb485f3a7a480de38d25a900f165a", "name": "libcpupower.so.1", "size": 22024, "description": null, "package": 1006465, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T11:06:20+00:00", "updated_at": "2021-03-07T11:06:20+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2018-6554", "risk": 55, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:24+00:00", "updated_at": "2021-03-08T10:06:24+00:00" }, { "name": "CVE-2018-6555", "risk": 78, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:25+00:00", "updated_at": "2021-03-08T10:06:25+00:00" }, { "name": "CVE-2018-7755", "risk": 55, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:26+00:00", "updated_at": "2021-03-08T10:06:26+00:00" }, { "name": "CVE-2018-9363", "risk": 84, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:26+00:00", "updated_at": "2021-03-08T10:06:26+00:00" }, { "name": "CVE-2018-9516", "risk": 78, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:27+00:00", "updated_at": "2021-03-08T10:06:27+00:00" }, { "name": "CVE-2018-10902", "risk": 78, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:27+00:00", "updated_at": "2021-03-08T10:06:27+00:00" }, { "name": "CVE-2018-10938", "risk": 71, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:28+00:00", "updated_at": "2021-03-08T10:06:28+00:00" }, { "name": "CVE-2018-13099", "risk": 55, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:29+00:00", "updated_at": "2021-03-08T10:06:29+00:00" }, { "name": "CVE-2018-14609", "risk": 71, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:29+00:00", "updated_at": "2021-03-08T10:06:29+00:00" }, { "name": "CVE-2018-14617", "risk": 71, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:30+00:00", "updated_at": "2021-03-08T10:06:30+00:00" }, { "name": "CVE-2018-14633", "risk": 83, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:30+00:00", "updated_at": "2021-03-08T10:06:30+00:00" }, { "name": "CVE-2018-14678", "risk": 78, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:31+00:00", "updated_at": "2021-03-08T10:06:31+00:00" }, { "name": "CVE-2018-14734", "risk": 78, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:31+00:00", "updated_at": "2021-03-08T10:06:31+00:00" }, { "name": "CVE-2018-15572", "risk": 65, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:32+00:00", "updated_at": "2021-03-08T10:06:32+00:00" }, { "name": "CVE-2018-15594", "risk": 55, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:32+00:00", "updated_at": "2021-03-08T10:06:32+00:00" }, { "name": "CVE-2018-16276", "risk": 78, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:33+00:00", "updated_at": "2021-03-08T10:06:33+00:00" }, { "name": "CVE-2018-16658", "risk": 61, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:34+00:00", "updated_at": "2021-03-08T10:06:34+00:00" }, { "name": "CVE-2018-17182", "risk": 78, "source": "DSA", "sid": "DSA-4308-1", "fixed": { "sha256": "d368fc31f08fd688f13bfae7b94c5d5b4efe13973f356d5af83c7781cdac5706", "name": "libcpupower1", "version": "4.9.110-3+deb9u5", "filename": "libcpupower1_4.9.110-3+deb9u5_i386.deb" }, "created_at": "2021-03-08T10:06:34+00:00", "updated_at": "2021-03-08T10:06:34+00:00" } ], "risk": 84, "vulnerable": 84, "outdated": 0, "malicious": 0, "created_at": "2018-08-21T20:45:47+00:00", "updated_at": "2021-03-07T11:06:20+00:00", "deleted_at": null }