1eda08abbdc0137355767004741d8887d75b7447ec86adf94fd771d86b7f953a
0ddda90713439c6738ed79f1a2626acdea504c22
5fceb31015992e783d21f0ddd542fcac
4.9.210-1
libcpupower-dev_4.9.210-1_i386.deb
692
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libcpupower1 (= 4.9.210-1)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-2182 | 78 | DSA DSA-4698-1 | |
CVE-2019-5108 | 65 | DSA DSA-4698-1 | |
CVE-2019-19319 | 65 | DSA DSA-4698-1 | |
CVE-2019-19462 | 55 | DSA DSA-4698-1 | |
CVE-2019-19768 | 75 | DSA DSA-4698-1 | |
CVE-2019-20806 | 44 | DSA DSA-4698-1 | |
CVE-2019-20811 | 55 | DSA DSA-4698-1 | |
CVE-2020-0543 | 55 | DSA DSA-4698-1 | |
CVE-2020-2732 | 68 | DSA DSA-4698-1 | |
CVE-2020-8428 | 71 | DSA DSA-4698-1 | |
CVE-2020-8647 | 61 | DSA DSA-4698-1 | |
CVE-2020-8648 | 71 | DSA DSA-4698-1 | |
CVE-2020-8649 | 59 | DSA DSA-4698-1 | |
CVE-2020-9383 | 71 | DSA DSA-4698-1 | |
CVE-2020-10711 | 59 | DSA DSA-4698-1 | |
CVE-2020-10732 | 44 | DSA DSA-4698-1 | |
CVE-2020-10751 | 61 | DSA DSA-4698-1 | |
CVE-2020-10757 | 78 | DSA DSA-4698-1 | |
CVE-2020-10942 | 54 | DSA DSA-4698-1 | |
CVE-2020-11494 | 44 | DSA DSA-4698-1 | |
CVE-2020-11565 | 60 | DSA DSA-4698-1 | |
CVE-2020-11608 | 49 | DSA DSA-4698-1 | |
CVE-2020-11609 | 49 | DSA DSA-4698-1 | |
CVE-2020-11668 | 71 | DSA DSA-4698-1 | |
CVE-2020-12114 | 47 | DSA DSA-4698-1 | |
CVE-2020-12464 | 72 | DSA DSA-4698-1 | |
CVE-2020-12652 | 47 | DSA DSA-4698-1 | |
CVE-2020-12653 | 78 | DSA DSA-4698-1 | |
CVE-2020-12654 | 71 | DSA DSA-4698-1 | |
CVE-2020-12770 | 67 | DSA DSA-4698-1 | |
CVE-2020-13143 | 65 | DSA DSA-4698-1 | |
CVE-2019-2182 | 78 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2019-5108 | 65 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2019-19319 | 65 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2019-19462 | 55 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2019-19768 | 75 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2019-20806 | 44 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2019-20811 | 55 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-0543 | 55 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-2732 | 68 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-8428 | 71 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-8647 | 61 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-8648 | 71 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-8649 | 59 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-9383 | 71 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-10711 | 59 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-10732 | 44 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-10751 | 61 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-10757 | 78 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-10942 | 54 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-11494 | 44 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-11565 | 60 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-11608 | 49 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-11609 | 49 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-11668 | 71 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-12114 | 47 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-12464 | 72 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-12652 | 47 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-12653 | 78 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-12654 | 71 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-12770 | 67 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
CVE-2020-13143 | 65 | DSA DSA-4698-1 | libcpupower-dev 4.9.210-1+deb9u1 |
{ "sha256": "1eda08abbdc0137355767004741d8887d75b7447ec86adf94fd771d86b7f953a", "sha1": "0ddda90713439c6738ed79f1a2626acdea504c22", "md5": "5fceb31015992e783d21f0ddd542fcac", "type": "DEB", "arch": "I386", "name": "libcpupower-dev", "filename": "libcpupower-dev_4.9.210-1_i386.deb", "size": 692, "description": "CPU frequency and voltage scaling tools for Linux (development files)\nThis package contains the 'power/cpupower' headers and library shared\nobjects.", "url": "https://www.kernel.org/", "version": "4.9.210-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libcpupower1 (= 4.9.210-1)", "applications": [], "vulnerabilities": [ { "name": "CVE-2019-2182", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T20:51:56+00:00", "updated_at": "2021-03-07T20:51:56+00:00" }, { "name": "CVE-2019-5108", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T22:56:23+00:00", "updated_at": "2021-03-07T22:56:23+00:00" }, { "name": "CVE-2019-19319", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T22:57:19+00:00", "updated_at": "2021-03-07T22:57:19+00:00" }, { "name": "CVE-2019-19462", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T22:58:19+00:00", "updated_at": "2021-03-07T22:58:19+00:00" }, { "name": "CVE-2019-19768", "risk": 75, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T22:59:06+00:00", "updated_at": "2021-03-07T22:59:06+00:00" }, { "name": "CVE-2019-20806", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:00:01+00:00", "updated_at": "2021-03-07T23:00:01+00:00" }, { "name": "CVE-2019-20811", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:00:52+00:00", "updated_at": "2021-03-07T23:00:52+00:00" }, { "name": "CVE-2020-0543", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:01:43+00:00", "updated_at": "2021-03-07T23:01:43+00:00" }, { "name": "CVE-2020-2732", "risk": 68, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:02:37+00:00", "updated_at": "2021-03-07T23:02:37+00:00" }, { "name": "CVE-2020-8428", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:03:38+00:00", "updated_at": "2021-03-07T23:03:38+00:00" }, { "name": "CVE-2020-8647", "risk": 61, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:04:35+00:00", "updated_at": "2021-03-07T23:04:35+00:00" }, { "name": "CVE-2020-8648", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:05:22+00:00", "updated_at": "2021-03-07T23:05:22+00:00" }, { "name": "CVE-2020-8649", "risk": 59, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:06:19+00:00", "updated_at": "2021-03-07T23:06:19+00:00" }, { "name": "CVE-2020-9383", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:07:16+00:00", "updated_at": "2021-03-07T23:07:16+00:00" }, { "name": "CVE-2020-10711", "risk": 59, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:08:20+00:00", "updated_at": "2021-03-07T23:08:20+00:00" }, { "name": "CVE-2020-10732", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:09:18+00:00", "updated_at": "2021-03-07T23:09:18+00:00" }, { "name": "CVE-2020-10751", "risk": 61, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:10:16+00:00", "updated_at": "2021-03-07T23:10:16+00:00" }, { "name": "CVE-2020-10757", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:11:13+00:00", "updated_at": "2021-03-07T23:11:13+00:00" }, { "name": "CVE-2020-10942", "risk": 54, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:12:12+00:00", "updated_at": "2021-03-07T23:12:12+00:00" }, { "name": "CVE-2020-11494", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:13:13+00:00", "updated_at": "2021-03-07T23:13:13+00:00" }, { "name": "CVE-2020-11565", "risk": 60, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:14:13+00:00", "updated_at": "2021-03-07T23:14:13+00:00" }, { "name": "CVE-2020-11608", "risk": 49, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:15:08+00:00", "updated_at": "2021-03-07T23:15:08+00:00" }, { "name": "CVE-2020-11609", "risk": 49, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:16:04+00:00", "updated_at": "2021-03-07T23:16:04+00:00" }, { "name": "CVE-2020-11668", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:17:06+00:00", "updated_at": "2021-03-07T23:17:06+00:00" }, { "name": "CVE-2020-12114", "risk": 47, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:18:00+00:00", "updated_at": "2021-03-07T23:18:00+00:00" }, { "name": "CVE-2020-12464", "risk": 72, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:18:58+00:00", "updated_at": "2021-03-07T23:18:58+00:00" }, { "name": "CVE-2020-12652", "risk": 47, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:19:55+00:00", "updated_at": "2021-03-07T23:19:55+00:00" }, { "name": "CVE-2020-12653", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:20:53+00:00", "updated_at": "2021-03-07T23:20:53+00:00" }, { "name": "CVE-2020-12654", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:21:49+00:00", "updated_at": "2021-03-07T23:21:49+00:00" }, { "name": "CVE-2020-12770", "risk": 67, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:22:48+00:00", "updated_at": "2021-03-07T23:22:48+00:00" }, { "name": "CVE-2020-13143", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": null, "created_at": "2021-03-07T23:23:47+00:00", "updated_at": "2021-03-07T23:23:47+00:00" }, { "name": "CVE-2019-2182", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:40:55+00:00", "updated_at": "2021-03-09T07:40:55+00:00" }, { "name": "CVE-2019-5108", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:40:56+00:00", "updated_at": "2021-03-09T07:40:56+00:00" }, { "name": "CVE-2019-19319", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:40:57+00:00", "updated_at": "2021-03-09T07:40:57+00:00" }, { "name": "CVE-2019-19462", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:40:58+00:00", "updated_at": "2021-03-09T07:40:58+00:00" }, { "name": "CVE-2019-19768", "risk": 75, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:40:59+00:00", "updated_at": "2021-03-09T07:40:59+00:00" }, { "name": "CVE-2019-20806", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:00+00:00", "updated_at": "2021-03-09T07:41:00+00:00" }, { "name": "CVE-2019-20811", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:01+00:00", "updated_at": "2021-03-09T07:41:01+00:00" }, { "name": "CVE-2020-0543", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:01+00:00", "updated_at": "2021-03-09T07:41:01+00:00" }, { "name": "CVE-2020-2732", "risk": 68, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:02+00:00", "updated_at": "2021-03-09T07:41:02+00:00" }, { "name": "CVE-2020-8428", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:03+00:00", "updated_at": "2021-03-09T07:41:03+00:00" }, { "name": "CVE-2020-8647", "risk": 61, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:04+00:00", "updated_at": "2021-03-09T07:41:04+00:00" }, { "name": "CVE-2020-8648", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:05+00:00", "updated_at": "2021-03-09T07:41:05+00:00" }, { "name": "CVE-2020-8649", "risk": 59, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:06+00:00", "updated_at": "2021-03-09T07:41:06+00:00" }, { "name": "CVE-2020-9383", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:07+00:00", "updated_at": "2021-03-09T07:41:07+00:00" }, { "name": "CVE-2020-10711", "risk": 59, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:08+00:00", "updated_at": "2021-03-09T07:41:08+00:00" }, { "name": "CVE-2020-10732", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:09+00:00", "updated_at": "2021-03-09T07:41:09+00:00" }, { "name": "CVE-2020-10751", "risk": 61, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:09+00:00", "updated_at": "2021-03-09T07:41:09+00:00" }, { "name": "CVE-2020-10757", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:10+00:00", "updated_at": "2021-03-09T07:41:10+00:00" }, { "name": "CVE-2020-10942", "risk": 54, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:11+00:00", "updated_at": "2021-03-09T07:41:11+00:00" }, { "name": "CVE-2020-11494", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:12+00:00", "updated_at": "2021-03-09T07:41:12+00:00" }, { "name": "CVE-2020-11565", "risk": 60, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:13+00:00", "updated_at": "2021-03-09T07:41:13+00:00" }, { "name": "CVE-2020-11608", "risk": 49, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:14+00:00", "updated_at": "2021-03-09T07:41:14+00:00" }, { "name": "CVE-2020-11609", "risk": 49, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:15+00:00", "updated_at": "2021-03-09T07:41:15+00:00" }, { "name": "CVE-2020-11668", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:16+00:00", "updated_at": "2021-03-09T07:41:16+00:00" }, { "name": "CVE-2020-12114", "risk": 47, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:16+00:00", "updated_at": "2021-03-09T07:41:16+00:00" }, { "name": "CVE-2020-12464", "risk": 72, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:17+00:00", "updated_at": "2021-03-09T07:41:17+00:00" }, { "name": "CVE-2020-12652", "risk": 47, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:18+00:00", "updated_at": "2021-03-09T07:41:18+00:00" }, { "name": "CVE-2020-12653", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:19+00:00", "updated_at": "2021-03-09T07:41:19+00:00" }, { "name": "CVE-2020-12654", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:20+00:00", "updated_at": "2021-03-09T07:41:20+00:00" }, { "name": "CVE-2020-12770", "risk": 67, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:21+00:00", "updated_at": "2021-03-09T07:41:21+00:00" }, { "name": "CVE-2020-13143", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "76037b4f7958e301264b3940c9b8e80944b50a0b21a9012f98a77587a827b617", "name": "libcpupower-dev", "version": "4.9.210-1+deb9u1", "filename": "libcpupower-dev_4.9.210-1+deb9u1_i386.deb" }, "created_at": "2021-03-09T07:41:22+00:00", "updated_at": "2021-03-09T07:41:22+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2020-01-26T01:29:29+00:00", "updated_at": "2021-03-07T11:26:03+00:00", "deleted_at": null }