538176ba54e9ea1ef8d21d3bd7899820aa3d79e6f71731a1b78d6416e104a4e6
0b452e7b26a4bbaa70b8ca5dce3bc978cb745f74
59209a8fd9e9cf42e13b2b0fd21c393a
5.10.158-2
libcpupower1_5.10.158-2_i386.deb
571
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.1 /usr/lib/i386-linux-gnu/libcpupower.so.0.0.1 | 21984 | 0 | ||
libcpupower.so.1 /usr/lib/i386-linux-gnu/libcpupower.so.1 | 21984 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | libcpupower1 5.10.162-1 |
{ "sha256": "538176ba54e9ea1ef8d21d3bd7899820aa3d79e6f71731a1b78d6416e104a4e6", "sha1": "0b452e7b26a4bbaa70b8ca5dce3bc978cb745f74", "md5": "59209a8fd9e9cf42e13b2b0fd21c393a", "type": "DEB", "arch": "I386", "name": "libcpupower1", "filename": "libcpupower1_5.10.158-2_i386.deb", "size": 571, "description": "CPU frequency and voltage scaling tools for Linux (libraries)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package contains the shared library.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7)", "applications": [ { "path": "/usr/lib/i386-linux-gnu/libcpupower.so.0.0.1", "sha256": "41bbff669c46e245da67dc4922fdc097d1f8f7296b073596faef350d2788051c", "sha1": "00a6ad97dd16c578e1ac1a3b1971ba8dfbc39a78", "md5": "dbd29df96ddfd769a76e0a08d230cfaf", "name": "libcpupower.so.1", "size": 21984, "description": null, "package": 4982859, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:25+00:00", "updated_at": "2022-12-16T10:14:25+00:00", "deleted_at": null }, { "path": "/usr/lib/i386-linux-gnu/libcpupower.so.1", "sha256": "41bbff669c46e245da67dc4922fdc097d1f8f7296b073596faef350d2788051c", "sha1": "00a6ad97dd16c578e1ac1a3b1971ba8dfbc39a78", "md5": "dbd29df96ddfd769a76e0a08d230cfaf", "name": "libcpupower.so.1", "size": 21984, "description": null, "package": 4982859, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:25+00:00", "updated_at": "2022-12-16T10:14:25+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:32+00:00", "updated_at": "2023-01-25T10:38:32+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:36+00:00", "updated_at": "2023-01-25T10:38:36+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:44+00:00", "updated_at": "2023-01-25T10:38:44+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "50a0ff4f7c3446f4412411c5ac078a9c48e4cf91baa89448e094cce052ec4bd9", "name": "libcpupower1", "version": "5.10.162-1", "filename": "libcpupower1_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T05:32:51+00:00", "updated_at": "2022-12-16T10:14:24+00:00", "deleted_at": null }