28ffa64b7e2d9867e99706746c5c71d30e3742d157ed3f79493651b9850a4d66
0501a40fe7c6f1a1f553adc1b47a3f8fcad95760
a8122a8de14e1ee43be7a1341982ecd0
5.10.127-1
linux-cpupower_5.10.127-1_i386.deb
821
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 130524 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 34676 | 0 | ||
cpupower /usr/bin/cpupower | 70068 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "28ffa64b7e2d9867e99706746c5c71d30e3742d157ed3f79493651b9850a4d66", "sha1": "0501a40fe7c6f1a1f553adc1b47a3f8fcad95760", "md5": "a8122a8de14e1ee43be7a1341982ecd0", "type": "DEB", "arch": "I386", "name": "linux-cpupower", "filename": "linux-cpupower_5.10.127-1_i386.deb", "size": 821, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "ac282f7e5e503add37c6aba8a15561c34be2e7535a147f9e1859e0eeb05f3e5b", "sha1": "16abef6466de4f679150d9f220950d251a085808", "md5": "7072f22c4ef96e6bb1e8b8dc3b5e631d", "name": "turbostat", "size": 130524, "description": null, "package": 3818280, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T02:55:41+00:00", "updated_at": "2022-07-02T02:55:41+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "57334632c4c45f721b72fc4acaf398fd007cab9bf54aa7824458d992a5415e16", "sha1": "4119afb5dfed0cb6291a8036f74f64a57430b62a", "md5": "3dfbbc173bfbeca11b1b7bdffbf3eb9f", "name": "x86_energy_perf_policy", "size": 34676, "description": null, "package": 3818280, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T02:55:41+00:00", "updated_at": "2022-07-02T02:55:41+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "5ac42968e4e4a721cc32dcbba2bc2c3c8d4b38a2e6fa1ff64c7c4c5b6bdb434e", "sha1": "19d9293d145faebd1d1ab1fd7dd8d55ebacfc72b", "md5": "242a1627b911fcf73a3beb41e15248c7", "name": "cpupower", "size": 70068, "description": null, "package": 3818280, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T02:55:41+00:00", "updated_at": "2022-07-02T02:55:41+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:15:46+00:00", "updated_at": "2022-07-27T20:15:46+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:18+00:00", "updated_at": "2022-07-27T20:16:18+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:51+00:00", "updated_at": "2022-07-27T20:16:51+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:23+00:00", "updated_at": "2022-07-27T20:17:23+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:56+00:00", "updated_at": "2022-07-27T20:17:56+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:26+00:00", "updated_at": "2022-07-27T20:18:26+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:57+00:00", "updated_at": "2022-07-27T20:18:57+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:28+00:00", "updated_at": "2022-07-27T20:19:28+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:59+00:00", "updated_at": "2022-07-27T20:19:59+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T06:37:52+00:00", "updated_at": "2022-07-02T01:55:41+00:00", "deleted_at": null }