Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (24)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that support these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: 570493d66e7bb346221cb09fbb31278a17b9b51c52b9a2081c68b0d8dd5b2409
  • SHA1: 181ee86ae42e288fd96e6dda3a01a92f8d9f24fe
  • MD5: b8444413d4cca0500b97cdb0c2b04d72
Information
  • Version: 4.9.189-3+deb9u1
  • Filename: linux-cpupower_4.9.189-3+deb9u1_i386.deb
  • Size: 870
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
722520
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
97600
cpupower
/usr/bin/cpupower
617840

Vulnerabilities

NameRiskSourceFixed
CVE-2018-1220765DSA
DSA-4564-1
CVE-2019-015455DSA
DSA-4564-1
CVE-2019-015578DSA
DSA-4564-1
CVE-2019-1113565DSA
DSA-4564-1
CVE-2018-1220765DSA
DSA-4564-1
linux-image-4.9.0-11-rt-amd64-dbg
4.9.189-3+deb9u2
CVE-2019-015455DSA
DSA-4564-1
linux-image-4.9.0-11-rt-amd64-dbg
4.9.189-3+deb9u2
CVE-2019-015578DSA
DSA-4564-1
linux-image-4.9.0-11-rt-amd64-dbg
4.9.189-3+deb9u2
CVE-2019-1113565DSA
DSA-4564-1
linux-image-4.9.0-11-rt-amd64-dbg
4.9.189-3+deb9u2
CVE-2018-1220765DSA
DSA-4564-1
linux-compiler-gcc-6-x86
4.9.189-3+deb9u2
CVE-2019-015455DSA
DSA-4564-1
linux-compiler-gcc-6-x86
4.9.189-3+deb9u2
CVE-2019-015578DSA
DSA-4564-1
linux-compiler-gcc-6-x86
4.9.189-3+deb9u2
CVE-2019-1113565DSA
DSA-4564-1
linux-compiler-gcc-6-x86
4.9.189-3+deb9u2
CVE-2018-1220765DSA
DSA-4564-1
linux-libc-dev
4.9.189-3+deb9u2
CVE-2019-015455DSA
DSA-4564-1
linux-libc-dev
4.9.189-3+deb9u2
CVE-2019-015578DSA
DSA-4564-1
linux-libc-dev
4.9.189-3+deb9u2
CVE-2019-1113565DSA
DSA-4564-1
linux-libc-dev
4.9.189-3+deb9u2
CVE-2018-1220765DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2
CVE-2019-015455DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2
CVE-2019-015578DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2
CVE-2019-1113565DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2
CVE-2018-1220765DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2
CVE-2019-015455DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2
CVE-2019-015578DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2
CVE-2019-1113565DSA
DSA-4564-1
linux-cpupower
4.9.189-3+deb9u2

Raw Object

{
  "sha256": "570493d66e7bb346221cb09fbb31278a17b9b51c52b9a2081c68b0d8dd5b2409",
  "sha1": "181ee86ae42e288fd96e6dda3a01a92f8d9f24fe",
  "md5": "b8444413d4cca0500b97cdb0c2b04d72",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_4.9.189-3+deb9u1_i386.deb",
  "size": 870,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "4.9.189-3+deb9u1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "8beb814cc67468f8f66d83f07536bcd0a94bd91943281b454af910d0ce7c68ba",
      "sha1": "a4d4c32a200b844aa0ea9bd67d57ec0892f7c932",
      "md5": "ec2b3fce64e8ddf9888bf326c906299f",
      "name": "turbostat",
      "size": 72252,
      "description": null,
      "package": 834183,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T09:32:18+00:00",
      "updated_at": "2021-03-06T09:32:18+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "6875fa658fa037d96dee536845dde945fe368a5f2fcbc6a2f99625a256ef3513",
      "sha1": "49f00ffd263000a979ceaaffea264f41164004cb",
      "md5": "cc24f92d84308271c5763be3c7caacbb",
      "name": "x86_energy_perf_policy",
      "size": 9760,
      "description": null,
      "package": 834183,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T09:32:18+00:00",
      "updated_at": "2021-03-06T09:32:18+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "25347145baacaa5ee851232feaaceb41c645fe71b167307c749eb5c5cff3afc1",
      "sha1": "7595bf139c76c053e4378d9b0a109f249b96d7fe",
      "md5": "540a632b8a6e92b735bb22e9dd061af3",
      "name": "cpupower",
      "size": 61784,
      "description": null,
      "package": 834183,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T09:32:19+00:00",
      "updated_at": "2021-03-06T09:32:19+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T10:00:50+00:00",
      "updated_at": "2021-03-08T10:00:50+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T10:00:51+00:00",
      "updated_at": "2021-03-08T10:00:51+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T10:00:52+00:00",
      "updated_at": "2021-03-08T10:00:52+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T10:00:53+00:00",
      "updated_at": "2021-03-08T10:00:53+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "30f82fa272a2ee045d3b0dc5c55cb8e30c4aa8974097a0df450a645146f929cc",
        "name": "linux-image-4.9.0-11-rt-amd64-dbg",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-image-4.9.0-11-rt-amd64-dbg_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T13:25:46+00:00",
      "updated_at": "2021-03-08T13:25:46+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "30f82fa272a2ee045d3b0dc5c55cb8e30c4aa8974097a0df450a645146f929cc",
        "name": "linux-image-4.9.0-11-rt-amd64-dbg",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-image-4.9.0-11-rt-amd64-dbg_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T13:25:47+00:00",
      "updated_at": "2021-03-08T13:25:47+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "30f82fa272a2ee045d3b0dc5c55cb8e30c4aa8974097a0df450a645146f929cc",
        "name": "linux-image-4.9.0-11-rt-amd64-dbg",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-image-4.9.0-11-rt-amd64-dbg_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T13:25:47+00:00",
      "updated_at": "2021-03-08T13:25:47+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "30f82fa272a2ee045d3b0dc5c55cb8e30c4aa8974097a0df450a645146f929cc",
        "name": "linux-image-4.9.0-11-rt-amd64-dbg",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-image-4.9.0-11-rt-amd64-dbg_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T13:25:48+00:00",
      "updated_at": "2021-03-08T13:25:48+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "8c608e98312761aa59d403ea2df1a56372e8576634cb3dd85d8416cb04001f91",
        "name": "linux-compiler-gcc-6-x86",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-compiler-gcc-6-x86_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T14:50:11+00:00",
      "updated_at": "2021-03-08T14:50:11+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "8c608e98312761aa59d403ea2df1a56372e8576634cb3dd85d8416cb04001f91",
        "name": "linux-compiler-gcc-6-x86",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-compiler-gcc-6-x86_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T14:50:12+00:00",
      "updated_at": "2021-03-08T14:50:12+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "8c608e98312761aa59d403ea2df1a56372e8576634cb3dd85d8416cb04001f91",
        "name": "linux-compiler-gcc-6-x86",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-compiler-gcc-6-x86_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T14:50:12+00:00",
      "updated_at": "2021-03-08T14:50:12+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "8c608e98312761aa59d403ea2df1a56372e8576634cb3dd85d8416cb04001f91",
        "name": "linux-compiler-gcc-6-x86",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-compiler-gcc-6-x86_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T14:50:13+00:00",
      "updated_at": "2021-03-08T14:50:13+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "ca1ea9e945a40ab958839d926be7144f8a72a349accf45fa09f9a78fe14de919",
        "name": "linux-libc-dev",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-libc-dev_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T17:00:16+00:00",
      "updated_at": "2021-03-08T17:00:16+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "ca1ea9e945a40ab958839d926be7144f8a72a349accf45fa09f9a78fe14de919",
        "name": "linux-libc-dev",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-libc-dev_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T17:00:17+00:00",
      "updated_at": "2021-03-08T17:00:17+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "ca1ea9e945a40ab958839d926be7144f8a72a349accf45fa09f9a78fe14de919",
        "name": "linux-libc-dev",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-libc-dev_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T17:00:17+00:00",
      "updated_at": "2021-03-08T17:00:17+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "ca1ea9e945a40ab958839d926be7144f8a72a349accf45fa09f9a78fe14de919",
        "name": "linux-libc-dev",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-libc-dev_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-08T17:00:18+00:00",
      "updated_at": "2021-03-08T17:00:18+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "4769d6c31cfdcb409fe4c31912acfca48b9c0000c3308e6438798f3c56b327d8",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-09T08:06:33+00:00",
      "updated_at": "2021-03-09T08:06:33+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "4769d6c31cfdcb409fe4c31912acfca48b9c0000c3308e6438798f3c56b327d8",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-09T08:06:34+00:00",
      "updated_at": "2021-03-09T08:06:34+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "4769d6c31cfdcb409fe4c31912acfca48b9c0000c3308e6438798f3c56b327d8",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-09T08:06:35+00:00",
      "updated_at": "2021-03-09T08:06:35+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "4769d6c31cfdcb409fe4c31912acfca48b9c0000c3308e6438798f3c56b327d8",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_amd64.deb"
      },
      "created_at": "2021-03-09T08:06:35+00:00",
      "updated_at": "2021-03-09T08:06:35+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "95d721d7dafd20a2b7f1d1bad9b630d5d879967d942710bc1709d0249591fc49",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_i386.deb"
      },
      "created_at": "2021-03-21T07:49:54+00:00",
      "updated_at": "2021-03-21T07:49:54+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "95d721d7dafd20a2b7f1d1bad9b630d5d879967d942710bc1709d0249591fc49",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_i386.deb"
      },
      "created_at": "2021-03-21T07:49:56+00:00",
      "updated_at": "2021-03-21T07:49:56+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "95d721d7dafd20a2b7f1d1bad9b630d5d879967d942710bc1709d0249591fc49",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_i386.deb"
      },
      "created_at": "2021-03-21T07:49:57+00:00",
      "updated_at": "2021-03-21T07:49:57+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "95d721d7dafd20a2b7f1d1bad9b630d5d879967d942710bc1709d0249591fc49",
        "name": "linux-cpupower",
        "version": "4.9.189-3+deb9u2",
        "filename": "linux-cpupower_4.9.189-3+deb9u2_i386.deb"
      },
      "created_at": "2021-03-21T07:49:59+00:00",
      "updated_at": "2021-03-21T07:49:59+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-09-23T14:44:44+00:00",
  "updated_at": "2021-03-06T09:32:18+00:00",
  "deleted_at": null
}