3b49b9bcc3c745173a32bfb70af7659322e6469c0a1e23c97ba8333781d17a8a
c1f1a52c20569f641a2a2bdf5354b44baee8d62d
c57457ca45992388faf53b89397d90a3
4.19.146-1
linux-cpupower_4.19.146-1_i386.deb
781
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 34644 | 0 | ||
turbostat /usr/sbin/turbostat | 121980 | 0 | ||
cpupower /usr/bin/cpupower | 65940 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-12351 | 88 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
{ "sha256": "3b49b9bcc3c745173a32bfb70af7659322e6469c0a1e23c97ba8333781d17a8a", "sha1": "c1f1a52c20569f641a2a2bdf5354b44baee8d62d", "md5": "c57457ca45992388faf53b89397d90a3", "type": "DEB", "arch": "I386", "name": "linux-cpupower", "filename": "linux-cpupower_4.19.146-1_i386.deb", "size": 781, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.19.146-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "7eeb5b3f972ccf86a44f60b0a673734e67d9a379cee820393f62823ccfbf1204", "sha1": "71362c59116f87db4c4796fb87fd9a9d21921c7d", "md5": "4aa71e9720022ec39a21c4f4ad349709", "name": "x86_energy_perf_policy", "size": 34644, "description": null, "package": 1077477, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:31:00+00:00", "updated_at": "2021-03-09T02:31:00+00:00", "deleted_at": null }, { "path": "/usr/sbin/turbostat", "sha256": "af25367e1140a7bb81c93d763f6648524a35a5a4b587eb32437dbd0c562cdfeb", "sha1": "5e31e5ba29822782938407f86ef5c292c6eae822", "md5": "82f922451bf4b20a7a2084af01304733", "name": "turbostat", "size": 121980, "description": null, "package": 1077477, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:31:00+00:00", "updated_at": "2021-03-09T02:31:00+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "11c3c920b7e19ce417b5cbea37b0f52220363ed5a1034168d1aa74b96409718c", "sha1": "0af726525df91b15bdfebb5bd6ef9ce602981b39", "md5": "b5622904ad34dddbf0a5e5b6d568f9cd", "name": "cpupower", "size": 65940, "description": null, "package": 1077477, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:31:00+00:00", "updated_at": "2021-03-09T02:31:00+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:39+00:00", "updated_at": "2021-03-09T07:31:39+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:50+00:00", "updated_at": "2021-03-09T07:31:50+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:00+00:00", "updated_at": "2021-03-09T07:32:00+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:08+00:00", "updated_at": "2021-03-09T07:32:08+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:17+00:00", "updated_at": "2021-03-09T07:32:17+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:16+00:00", "updated_at": "2021-03-21T07:40:16+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:18+00:00", "updated_at": "2021-03-21T07:40:18+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:20+00:00", "updated_at": "2021-03-21T07:40:20+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:22+00:00", "updated_at": "2021-03-21T07:40:22+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d70c9ed6bb9d454f188905e65c73f37a678fe3bbeedc5fa3194aedff01828f7f", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:24+00:00", "updated_at": "2021-03-21T07:40:24+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2020-09-18T21:23:27+00:00", "updated_at": "2021-03-09T02:31:00+00:00", "deleted_at": null }