2452a180d57c36c687550206bab2e99cd2c99fdc024245d2ebcb0aa5c83d6b55
2dfc7cac7ee0a2c3536e9ca30659f0a49dbe3f72
2307db2cf6a276e0237a8a8d22ddcb45
4.19.37-5+deb10u2~bpo9+1
libcpupower1_4.19.37-5+deb10u2~bpo9+1_amd64.deb
305
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.4)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.1 /usr/lib/x86_64-linux-gnu/libcpupower.so.0.0.1 | 22816 | 0 | ||
libcpupower.so.1 /usr/lib/x86_64-linux-gnu/libcpupower.so.1 | 22816 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2018-20836 | 93 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-1125 | 55 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-1999 | 78 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-10207 | 55 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-10638 | 65 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-12817 | 70 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-12984 | 55 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-13233 | 70 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-13631 | 68 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-13648 | 55 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-14283 | 68 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2019-14284 | 62 | DSA DSA-4495-1 | linux-config-4.19 4.19.37-5+deb10u2 |
CVE-2018-20836 | 93 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-1125 | 55 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-1999 | 78 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-10207 | 55 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-10638 | 65 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-12817 | 70 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-12984 | 55 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-13233 | 70 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-13631 | 68 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-13648 | 55 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-14283 | 68 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
CVE-2019-14284 | 62 | DSA DSA-4495-1 | libcpupower1 4.19.37-5+deb10u2 |
{ "sha256": "2452a180d57c36c687550206bab2e99cd2c99fdc024245d2ebcb0aa5c83d6b55", "sha1": "2dfc7cac7ee0a2c3536e9ca30659f0a49dbe3f72", "md5": "2307db2cf6a276e0237a8a8d22ddcb45", "type": "DEB", "arch": "AMD64", "name": "libcpupower1", "filename": "libcpupower1_4.19.37-5+deb10u2~bpo9+1_amd64.deb", "size": 305, "description": "CPU frequency and voltage scaling tools for Linux (libraries)\nThis package contains the shared library.", "url": "https://www.kernel.org/", "version": "4.19.37-5+deb10u2~bpo9+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.4)", "applications": [ { "path": "/usr/lib/x86_64-linux-gnu/libcpupower.so.0.0.1", "sha256": "85c240ede3f298b2ef22509bd5e87bbc8f5538c1442ca3969cea446b7f1a6930", "sha1": "2ec11c6f33ee5bfbf73ab868d7488497a12f2beb", "md5": "d214af5ec4b05cdea96ddce51ff37067", "name": "libcpupower.so.1", "size": 22816, "description": null, "package": 932068, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-06T22:34:00+00:00", "updated_at": "2021-03-06T22:34:00+00:00", "deleted_at": null }, { "path": "/usr/lib/x86_64-linux-gnu/libcpupower.so.1", "sha256": "85c240ede3f298b2ef22509bd5e87bbc8f5538c1442ca3969cea446b7f1a6930", "sha1": "2ec11c6f33ee5bfbf73ab868d7488497a12f2beb", "md5": "d214af5ec4b05cdea96ddce51ff37067", "name": "libcpupower.so.1", "size": 22816, "description": null, "package": 932068, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-06T22:34:00+00:00", "updated_at": "2021-03-06T22:34:00+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:10+00:00", "updated_at": "2021-03-08T10:03:10+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:11+00:00", "updated_at": "2021-03-08T10:03:11+00:00" }, { "name": "CVE-2019-1999", "risk": 78, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:12+00:00", "updated_at": "2021-03-08T10:03:12+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:13+00:00", "updated_at": "2021-03-08T10:03:13+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:14+00:00", "updated_at": "2021-03-08T10:03:14+00:00" }, { "name": "CVE-2019-12817", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:15+00:00", "updated_at": "2021-03-08T10:03:15+00:00" }, { "name": "CVE-2019-12984", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:16+00:00", "updated_at": "2021-03-08T10:03:16+00:00" }, { "name": "CVE-2019-13233", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:17+00:00", "updated_at": "2021-03-08T10:03:17+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:18+00:00", "updated_at": "2021-03-08T10:03:18+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:19+00:00", "updated_at": "2021-03-08T10:03:19+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:20+00:00", "updated_at": "2021-03-08T10:03:20+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "d0732603d222d4d6be2ddc9e64835e826e5ef2f8ee84a6bd2f17fa4b6be4d14f", "name": "linux-config-4.19", "version": "4.19.37-5+deb10u2", "filename": "linux-config-4.19_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:21+00:00", "updated_at": "2021-03-08T10:03:21+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:54:55+00:00", "updated_at": "2021-03-21T19:54:55+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:54:59+00:00", "updated_at": "2021-03-21T19:54:59+00:00" }, { "name": "CVE-2019-1999", "risk": 78, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:02+00:00", "updated_at": "2021-03-21T19:55:02+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:06+00:00", "updated_at": "2021-03-21T19:55:06+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:09+00:00", "updated_at": "2021-03-21T19:55:09+00:00" }, { "name": "CVE-2019-12817", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:13+00:00", "updated_at": "2021-03-21T19:55:13+00:00" }, { "name": "CVE-2019-12984", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:16+00:00", "updated_at": "2021-03-21T19:55:16+00:00" }, { "name": "CVE-2019-13233", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:20+00:00", "updated_at": "2021-03-21T19:55:20+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:24+00:00", "updated_at": "2021-03-21T19:55:24+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:27+00:00", "updated_at": "2021-03-21T19:55:27+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:31+00:00", "updated_at": "2021-03-21T19:55:31+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "a0f044f4702559dbb070a36573f2b1bfa4e7c2dbe54af21fb94de19f260eeeb4", "name": "libcpupower1", "version": "4.19.37-5+deb10u2", "filename": "libcpupower1_4.19.37-5+deb10u2_amd64.deb" }, "created_at": "2021-03-21T19:55:35+00:00", "updated_at": "2021-03-21T19:55:35+00:00" } ], "risk": 93, "vulnerable": 93, "outdated": 0, "malicious": 0, "created_at": "2019-08-22T08:48:09+00:00", "updated_at": "2021-03-06T22:34:00+00:00", "deleted_at": null }