Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (14)

libcpupower-dev

Hashes
CPU frequency and voltage scaling tools for Linux (development files) libcpupower is a library for inspecting and controlling cpufreq and cpuidle tunables. This package is needed to compile programs against libcpupower.
  • SHA256: 681c495e143515760b24dcd671a65d543adc15bede8e9b0a7e3e23d726a4b69a
  • SHA1: af9c95cb3f10adb9c3627e9dfefe9242030c323f
  • MD5: 466344eec101310e733bc091cc843696
Information
  • Version: 5.10.120-1~bpo10+1
  • Filename: libcpupower-dev_5.10.120-1~bpo10+1_amd64.deb
  • Size: 484
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libcpupower1 (= 5.10.120-1~bpo10+1)

Vulnerabilities

NameRiskSourceFixed
CVE-2022-04940DSA
DSA-5161-1
CVE-2022-085455DSA
DSA-5161-1
CVE-2022-101291DSA
DSA-5161-1
CVE-2022-172970DSA
DSA-5161-1
CVE-2022-17860DSA
DSA-5161-1
CVE-2022-17890DSA
DSA-5161-1
CVE-2022-18520DSA
DSA-5161-1
CVE-2022-322500DSA
DSA-5161-1
CVE-2022-19720DSA
DSA-5161-1
CVE-2022-197441DSA
DSA-5161-1
CVE-2022-197555DSA
DSA-5161-1
CVE-2022-2149967DSA
DSA-5161-1
CVE-2022-2889378DSA
DSA-5161-1
CVE-2022-20780DSA
DSA-5161-1

Raw Object

{
  "sha256": "681c495e143515760b24dcd671a65d543adc15bede8e9b0a7e3e23d726a4b69a",
  "sha1": "af9c95cb3f10adb9c3627e9dfefe9242030c323f",
  "md5": "466344eec101310e733bc091cc843696",
  "type": "DEB",
  "arch": "AMD64",
  "name": "libcpupower-dev",
  "filename": "libcpupower-dev_5.10.120-1~bpo10+1_amd64.deb",
  "size": 484,
  "description": "CPU frequency and voltage scaling tools for Linux (development files)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package is needed to compile programs against libcpupower.",
  "url": "https://www.kernel.org/",
  "version": "5.10.120-1~bpo10+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libcpupower1 (= 5.10.120-1~bpo10+1)",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:43:59+00:00",
      "updated_at": "2022-07-27T20:43:59+00:00"
    },
    {
      "name": "CVE-2022-0854",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:31+00:00",
      "updated_at": "2022-07-27T20:44:31+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:03+00:00",
      "updated_at": "2022-07-27T20:45:03+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:34+00:00",
      "updated_at": "2022-07-27T20:45:34+00:00"
    },
    {
      "name": "CVE-2022-1786",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:08+00:00",
      "updated_at": "2022-07-27T20:46:08+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:40+00:00",
      "updated_at": "2022-07-27T20:46:40+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:16+00:00",
      "updated_at": "2022-07-27T20:47:16+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:50+00:00",
      "updated_at": "2022-07-27T20:47:50+00:00"
    },
    {
      "name": "CVE-2022-1972",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:27+00:00",
      "updated_at": "2022-07-27T20:48:27+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:00+00:00",
      "updated_at": "2022-07-27T20:49:00+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:37+00:00",
      "updated_at": "2022-07-27T20:49:37+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:12+00:00",
      "updated_at": "2022-07-27T20:50:12+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:43+00:00",
      "updated_at": "2022-07-27T20:50:43+00:00"
    },
    {
      "name": "CVE-2022-2078",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-09-18T15:50:58+00:00",
      "updated_at": "2022-09-18T15:50:58+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-20T19:47:19+00:00",
  "updated_at": "2022-06-21T01:21:54+00:00",
  "deleted_at": null
}