Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (9)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that supports these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: 28ffa64b7e2d9867e99706746c5c71d30e3742d157ed3f79493651b9850a4d66
  • SHA1: 0501a40fe7c6f1a1f553adc1b47a3f8fcad95760
  • MD5: a8122a8de14e1ee43be7a1341982ecd0
Information
  • Version: 5.10.127-1
  • Filename: linux-cpupower_5.10.127-1_i386.deb
  • Size: 821
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
1305240
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
346760
cpupower
/usr/bin/cpupower
700680

Vulnerabilities

NameRiskSourceFixed
CVE-2021-3365578DSA
DSA-5191-1
CVE-2022-23180DSA
DSA-5191-1
CVE-2022-263650DSA
DSA-5191-1
CVE-2022-337400DSA
DSA-5191-1
CVE-2022-337410DSA
DSA-5191-1
CVE-2022-337420DSA
DSA-5191-1
CVE-2022-337430DSA
DSA-5191-1
CVE-2022-337440DSA
DSA-5191-1
CVE-2022-349180DSA
DSA-5191-1

Raw Object

{
  "sha256": "28ffa64b7e2d9867e99706746c5c71d30e3742d157ed3f79493651b9850a4d66",
  "sha1": "0501a40fe7c6f1a1f553adc1b47a3f8fcad95760",
  "md5": "a8122a8de14e1ee43be7a1341982ecd0",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_5.10.127-1_i386.deb",
  "size": 821,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "5.10.127-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "ac282f7e5e503add37c6aba8a15561c34be2e7535a147f9e1859e0eeb05f3e5b",
      "sha1": "16abef6466de4f679150d9f220950d251a085808",
      "md5": "7072f22c4ef96e6bb1e8b8dc3b5e631d",
      "name": "turbostat",
      "size": 130524,
      "description": null,
      "package": 3818280,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T02:55:41+00:00",
      "updated_at": "2022-07-02T02:55:41+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "57334632c4c45f721b72fc4acaf398fd007cab9bf54aa7824458d992a5415e16",
      "sha1": "4119afb5dfed0cb6291a8036f74f64a57430b62a",
      "md5": "3dfbbc173bfbeca11b1b7bdffbf3eb9f",
      "name": "x86_energy_perf_policy",
      "size": 34676,
      "description": null,
      "package": 3818280,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T02:55:41+00:00",
      "updated_at": "2022-07-02T02:55:41+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "5ac42968e4e4a721cc32dcbba2bc2c3c8d4b38a2e6fa1ff64c7c4c5b6bdb434e",
      "sha1": "19d9293d145faebd1d1ab1fd7dd8d55ebacfc72b",
      "md5": "242a1627b911fcf73a3beb41e15248c7",
      "name": "cpupower",
      "size": 70068,
      "description": null,
      "package": 3818280,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T02:55:41+00:00",
      "updated_at": "2022-07-02T02:55:41+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:15:46+00:00",
      "updated_at": "2022-07-27T20:15:46+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:18+00:00",
      "updated_at": "2022-07-27T20:16:18+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:51+00:00",
      "updated_at": "2022-07-27T20:16:51+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:23+00:00",
      "updated_at": "2022-07-27T20:17:23+00:00"
    },
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:56+00:00",
      "updated_at": "2022-07-27T20:17:56+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:26+00:00",
      "updated_at": "2022-07-27T20:18:26+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:57+00:00",
      "updated_at": "2022-07-27T20:18:57+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:28+00:00",
      "updated_at": "2022-07-27T20:19:28+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:59+00:00",
      "updated_at": "2022-07-27T20:19:59+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-07-01T06:37:52+00:00",
  "updated_at": "2022-07-02T01:55:41+00:00",
  "deleted_at": null
}