59b3daa2eadb57cd76ef30b3a987ddfc88806428dc919e2fac40f1dcfdf5e1ce
48485372acefba540ae5f5a97d8249f612214e73
70e258a3c44f5323390fe181482955ec
4.9.168-1+deb9u4
linux-cpupower_4.9.168-1+deb9u4_i386.deb
847
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 9760 | 0 | ||
turbostat /usr/sbin/turbostat | 72252 | 0 | ||
cpupower /usr/bin/cpupower | 61784 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2015-8553 | 65 | DSA DSA-4497-1 | |
CVE-2017-18509 | 78 | DSA DSA-4497-1 | |
CVE-2018-5995 | 55 | DSA DSA-4497-1 | |
CVE-2018-20836 | 93 | DSA DSA-4497-1 | |
CVE-2018-20856 | 78 | DSA DSA-4497-1 | |
CVE-2019-1125 | 55 | DSA DSA-4497-1 | |
CVE-2019-3882 | 55 | DSA DSA-4497-1 | |
CVE-2019-3900 | 77 | DSA DSA-4497-1 | |
CVE-2019-10207 | 55 | DSA DSA-4497-1 | |
CVE-2019-10638 | 65 | DSA DSA-4497-1 | |
CVE-2019-10639 | 75 | DSA DSA-4497-1 | |
CVE-2019-13631 | 68 | DSA DSA-4497-1 | |
CVE-2019-13648 | 55 | DSA DSA-4497-1 | |
CVE-2019-14283 | 68 | DSA DSA-4497-1 | |
CVE-2019-14284 | 62 | DSA DSA-4497-1 | |
CVE-2019-15239 | 78 | DSA DSA-4497-1 | |
CVE-2015-8553 | 65 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2017-18509 | 78 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2018-5995 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2018-20836 | 93 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2018-20856 | 78 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-1125 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-3882 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-3900 | 77 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-10207 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-10638 | 65 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-10639 | 75 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-13631 | 68 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-13648 | 55 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-14283 | 68 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-14284 | 62 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
CVE-2019-15239 | 78 | DSA DSA-4497-1 | linux-cpupower 4.9.168-1+deb9u5 |
{ "sha256": "59b3daa2eadb57cd76ef30b3a987ddfc88806428dc919e2fac40f1dcfdf5e1ce", "sha1": "48485372acefba540ae5f5a97d8249f612214e73", "md5": "70e258a3c44f5323390fe181482955ec", "type": "DEB", "arch": "I386", "name": "linux-cpupower", "filename": "linux-cpupower_4.9.168-1+deb9u4_i386.deb", "size": 847, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.9.168-1+deb9u4", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "059a4dab095080e8a8b2342fe075b8de5a276d075f715277b70cc3841ebea02f", "sha1": "dd3c4947d5e72600f8e99267652b9df4fc482cea", "md5": "77c149071887af765f4e0b3b6616cbfa", "name": "x86_energy_perf_policy", "size": 9760, "description": null, "package": 1077054, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:24:32+00:00", "updated_at": "2021-03-09T02:24:32+00:00", "deleted_at": null }, { "path": "/usr/sbin/turbostat", "sha256": "10b8abdf766bb526551b31332bbb54863d5d88880391bff6661a305e5923e011", "sha1": "80d43fb69630627c628e6d389fc36cf1e3133684", "md5": "e9c5e2d0ba84390142863b5ad3cd8cf4", "name": "turbostat", "size": 72252, "description": null, "package": 1077054, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:24:32+00:00", "updated_at": "2021-03-09T02:24:32+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "734d37c002ac89d17dc804af4cb28dd7a73026f8322faaac87b27d74914f8f17", "sha1": "752a3abe5f51c85ec87b8fb92de09610bb7f14e9", "md5": "7c8761b2acd9d62cb4caee7b75a29d11", "name": "cpupower", "size": 61784, "description": null, "package": 1077054, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:24:32+00:00", "updated_at": "2021-03-09T02:24:32+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2015-8553", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:09:58+00:00", "updated_at": "2021-03-09T08:09:58+00:00" }, { "name": "CVE-2017-18509", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:09:59+00:00", "updated_at": "2021-03-09T08:09:59+00:00" }, { "name": "CVE-2018-5995", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:00+00:00", "updated_at": "2021-03-09T08:10:00+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:01+00:00", "updated_at": "2021-03-09T08:10:01+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:02+00:00", "updated_at": "2021-03-09T08:10:02+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:03+00:00", "updated_at": "2021-03-09T08:10:03+00:00" }, { "name": "CVE-2019-3882", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:04+00:00", "updated_at": "2021-03-09T08:10:04+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:05+00:00", "updated_at": "2021-03-09T08:10:05+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:07+00:00", "updated_at": "2021-03-09T08:10:07+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:08+00:00", "updated_at": "2021-03-09T08:10:08+00:00" }, { "name": "CVE-2019-10639", "risk": 75, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:09+00:00", "updated_at": "2021-03-09T08:10:09+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:10+00:00", "updated_at": "2021-03-09T08:10:10+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:11+00:00", "updated_at": "2021-03-09T08:10:11+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:12+00:00", "updated_at": "2021-03-09T08:10:12+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:13+00:00", "updated_at": "2021-03-09T08:10:13+00:00" }, { "name": "CVE-2019-15239", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:14+00:00", "updated_at": "2021-03-09T08:10:14+00:00" }, { "name": "CVE-2015-8553", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:46+00:00", "updated_at": "2021-07-19T14:00:46+00:00" }, { "name": "CVE-2017-18509", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:46+00:00", "updated_at": "2021-07-19T14:00:46+00:00" }, { "name": "CVE-2018-5995", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:47+00:00", "updated_at": "2021-07-19T14:00:47+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:47+00:00", "updated_at": "2021-07-19T14:00:47+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:48+00:00", "updated_at": "2021-07-19T14:00:48+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:48+00:00", "updated_at": "2021-07-19T14:00:48+00:00" }, { "name": "CVE-2019-3882", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:49+00:00", "updated_at": "2021-07-19T14:00:49+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:49+00:00", "updated_at": "2021-07-19T14:00:49+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:50+00:00", "updated_at": "2021-07-19T14:00:50+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:50+00:00", "updated_at": "2021-07-19T14:00:50+00:00" }, { "name": "CVE-2019-10639", "risk": 75, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:51+00:00", "updated_at": "2021-07-19T14:00:51+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:51+00:00", "updated_at": "2021-07-19T14:00:51+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:52+00:00", "updated_at": "2021-07-19T14:00:52+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:52+00:00", "updated_at": "2021-07-19T14:00:52+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:53+00:00", "updated_at": "2021-07-19T14:00:53+00:00" }, { "name": "CVE-2019-15239", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "bae92ea80c34cf4836fc692de017da9a1182fd5ec34efd7d24eacc1bfabd7734", "name": "linux-cpupower", "version": "4.9.168-1+deb9u5", "filename": "linux-cpupower_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:53+00:00", "updated_at": "2021-07-19T14:00:53+00:00" } ], "risk": 93, "vulnerable": 93, "outdated": 0, "malicious": 0, "created_at": "2019-07-20T15:19:38+00:00", "updated_at": "2021-03-09T02:24:32+00:00", "deleted_at": null }