43975042ca6f7699debc1f1b5a113b1deb587b288405c34dbe3e641c870c5449
61c157487700d0ccc6287832ff5bbacaa79d1fc1
02e76b1e1d7a99d555080d4e69ff02a6
5.10.158-2
linux-cpupower_5.10.158-2_i386.deb
874
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 130524 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 34676 | 0 | ||
cpupower /usr/bin/cpupower | 70068 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | linux-cpupower 5.10.162-1 |
{ "sha256": "43975042ca6f7699debc1f1b5a113b1deb587b288405c34dbe3e641c870c5449", "sha1": "61c157487700d0ccc6287832ff5bbacaa79d1fc1", "md5": "02e76b1e1d7a99d555080d4e69ff02a6", "type": "DEB", "arch": "I386", "name": "linux-cpupower", "filename": "linux-cpupower_5.10.158-2_i386.deb", "size": 874, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "31a05b4dd87c3e6e3ed7a74aa1f953e8d258a0c0fb37254a90b2ee8f8b6338a5", "sha1": "1a89d8f75a987e28a6eb851be2fd9df86e6d3071", "md5": "4ae4d24680ec245cda578ef86c4364d2", "name": "turbostat", "size": 130524, "description": null, "package": 4982865, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:26+00:00", "updated_at": "2022-12-16T10:14:26+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "ab15629116e52108c0155b76e346e1c2512e9ef9c30526c2a1b0f9fb89319f3a", "sha1": "d77f17e808b134fe1d5cdaaf08942e423e5d0e16", "md5": "25d0aee55d8cb3205ece292ae932285f", "name": "x86_energy_perf_policy", "size": 34676, "description": null, "package": 4982865, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:27+00:00", "updated_at": "2022-12-16T10:14:27+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "316ae063b4f94e0e8b43b632ea012ead388aa683286d46c5b2f6057992a3f6c0", "sha1": "55c279b867b6bbb9b5f9a466697bc509bd2366fd", "md5": "3164598b4008919e600dbadc9e3d9c23", "name": "cpupower", "size": 70068, "description": null, "package": 4982865, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:27+00:00", "updated_at": "2022-12-16T10:14:27+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:33+00:00", "updated_at": "2023-01-25T10:38:33+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:37+00:00", "updated_at": "2023-01-25T10:38:37+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:44+00:00", "updated_at": "2023-01-25T10:38:44+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "35ad7939fd384de087618b1ca5abf7de70936dbf1815d6875f135b8e233b4cb7", "name": "linux-cpupower", "version": "5.10.162-1", "filename": "linux-cpupower_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T05:32:51+00:00", "updated_at": "2022-12-16T10:14:26+00:00", "deleted_at": null }