Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (10)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that support these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: 3b49b9bcc3c745173a32bfb70af7659322e6469c0a1e23c97ba8333781d17a8a
  • SHA1: c1f1a52c20569f641a2a2bdf5354b44baee8d62d
  • MD5: c57457ca45992388faf53b89397d90a3
Information
  • Version: 4.19.146-1
  • Filename: linux-cpupower_4.19.146-1_i386.deb
  • Size: 781
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
346440
turbostat
/usr/sbin/turbostat
1219800
cpupower
/usr/bin/cpupower
659400

Vulnerabilities

NameRiskSourceFixed
CVE-2020-1235188DSA
DSA-4774-1
linux-config-4.19
4.19.152-1
CVE-2020-1235265DSA
DSA-4774-1
linux-config-4.19
4.19.152-1
CVE-2020-2521160DSA
DSA-4774-1
linux-config-4.19
4.19.152-1
CVE-2020-2564375DSA
DSA-4774-1
linux-config-4.19
4.19.152-1
CVE-2020-2564575DSA
DSA-4774-1
linux-config-4.19
4.19.152-1
CVE-2020-1235188DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-1235265DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-2521160DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-2564375DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-2564575DSA
DSA-4774-1
linux-cpupower
4.19.152-1

Raw Object

{
  "sha256": "3b49b9bcc3c745173a32bfb70af7659322e6469c0a1e23c97ba8333781d17a8a",
  "sha1": "c1f1a52c20569f641a2a2bdf5354b44baee8d62d",
  "md5": "c57457ca45992388faf53b89397d90a3",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_4.19.146-1_i386.deb",
  "size": 781,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "4.19.146-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "7eeb5b3f972ccf86a44f60b0a673734e67d9a379cee820393f62823ccfbf1204",
      "sha1": "71362c59116f87db4c4796fb87fd9a9d21921c7d",
      "md5": "4aa71e9720022ec39a21c4f4ad349709",
      "name": "x86_energy_perf_policy",
      "size": 34644,
      "description": null,
      "package": 1077477,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:31:00+00:00",
      "updated_at": "2021-03-09T02:31:00+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "af25367e1140a7bb81c93d763f6648524a35a5a4b587eb32437dbd0c562cdfeb",
      "sha1": "5e31e5ba29822782938407f86ef5c292c6eae822",
      "md5": "82f922451bf4b20a7a2084af01304733",
      "name": "turbostat",
      "size": 121980,
      "description": null,
      "package": 1077477,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:31:00+00:00",
      "updated_at": "2021-03-09T02:31:00+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "11c3c920b7e19ce417b5cbea37b0f52220363ed5a1034168d1aa74b96409718c",
      "sha1": "0af726525df91b15bdfebb5bd6ef9ce602981b39",
      "md5": "b5622904ad34dddbf0a5e5b6d568f9cd",
      "name": "cpupower",
      "size": 65940,
      "description": null,
      "package": 1077477,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:31:00+00:00",
      "updated_at": "2021-03-09T02:31:00+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2020-12351",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530",
        "name": "linux-config-4.19",
        "version": "4.19.152-1",
        "filename": "linux-config-4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:31:39+00:00",
      "updated_at": "2021-03-09T07:31:39+00:00"
    },
    {
      "name": "CVE-2020-12352",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530",
        "name": "linux-config-4.19",
        "version": "4.19.152-1",
        "filename": "linux-config-4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:31:50+00:00",
      "updated_at": "2021-03-09T07:31:50+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530",
        "name": "linux-config-4.19",
        "version": "4.19.152-1",
        "filename": "linux-config-4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:32:00+00:00",
      "updated_at": "2021-03-09T07:32:00+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530",
        "name": "linux-config-4.19",
        "version": "4.19.152-1",
        "filename": "linux-config-4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:32:08+00:00",
      "updated_at": "2021-03-09T07:32:08+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530",
        "name": "linux-config-4.19",
        "version": "4.19.152-1",
        "filename": "linux-config-4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:32:17+00:00",
      "updated_at": "2021-03-09T07:32:17+00:00"
    },
    {
      "name": "CVE-2020-12351",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:16+00:00",
      "updated_at": "2021-03-21T07:40:16+00:00"
    },
    {
      "name": "CVE-2020-12352",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:18+00:00",
      "updated_at": "2021-03-21T07:40:18+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:20+00:00",
      "updated_at": "2021-03-21T07:40:20+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:22+00:00",
      "updated_at": "2021-03-21T07:40:22+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:24+00:00",
      "updated_at": "2021-03-21T07:40:24+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-09-18T21:23:27+00:00",
  "updated_at": "2021-03-09T02:31:00+00:00",
  "deleted_at": null
}