6a231d3728d2d3eb7af4d7bba26d6e6a3da89597ce0db757da3034fbd15cd72a
026ef527c5a99823ad5b628accbf833badce5fd6
d2be5e82d051afa8859046d8181a853f
4.9.168-1+deb9u4
libcpupower-dev_4.9.168-1+deb9u4_i386.deb
635
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libcpupower1 (= 4.9.168-1+deb9u4)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2015-8553 | 65 | DSA DSA-4497-1 | |
CVE-2017-18509 | 78 | DSA DSA-4497-1 | |
CVE-2018-5995 | 55 | DSA DSA-4497-1 | |
CVE-2018-20836 | 93 | DSA DSA-4497-1 | |
CVE-2018-20856 | 78 | DSA DSA-4497-1 | |
CVE-2019-1125 | 55 | DSA DSA-4497-1 | |
CVE-2019-3882 | 55 | DSA DSA-4497-1 | |
CVE-2019-3900 | 77 | DSA DSA-4497-1 | |
CVE-2019-10207 | 55 | DSA DSA-4497-1 | |
CVE-2019-10638 | 65 | DSA DSA-4497-1 | |
CVE-2019-10639 | 75 | DSA DSA-4497-1 | |
CVE-2019-13631 | 68 | DSA DSA-4497-1 | |
CVE-2019-13648 | 55 | DSA DSA-4497-1 | |
CVE-2019-14283 | 68 | DSA DSA-4497-1 | |
CVE-2019-14284 | 62 | DSA DSA-4497-1 | |
CVE-2019-15239 | 78 | DSA DSA-4497-1 | |
CVE-2015-8553 | 65 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2017-18509 | 78 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2018-5995 | 55 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2018-20836 | 93 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2018-20856 | 78 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-1125 | 55 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-3882 | 55 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-3900 | 77 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-10207 | 55 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-10638 | 65 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-10639 | 75 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-13631 | 68 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-13648 | 55 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-14283 | 68 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-14284 | 62 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
CVE-2019-15239 | 78 | DSA DSA-4497-1 | libcpupower-dev 4.9.168-1+deb9u5 |
{ "sha256": "6a231d3728d2d3eb7af4d7bba26d6e6a3da89597ce0db757da3034fbd15cd72a", "sha1": "026ef527c5a99823ad5b628accbf833badce5fd6", "md5": "d2be5e82d051afa8859046d8181a853f", "type": "DEB", "arch": "I386", "name": "libcpupower-dev", "filename": "libcpupower-dev_4.9.168-1+deb9u4_i386.deb", "size": 635, "description": "CPU frequency and voltage scaling tools for Linux (development files)\nThis package contains the 'power/cpupower' headers and library shared\nobjects.", "url": "https://www.kernel.org/", "version": "4.9.168-1+deb9u4", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libcpupower1 (= 4.9.168-1+deb9u4)", "applications": [], "vulnerabilities": [ { "name": "CVE-2015-8553", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:09:57+00:00", "updated_at": "2021-03-09T08:09:57+00:00" }, { "name": "CVE-2017-18509", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:09:58+00:00", "updated_at": "2021-03-09T08:09:58+00:00" }, { "name": "CVE-2018-5995", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:09:59+00:00", "updated_at": "2021-03-09T08:09:59+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:00+00:00", "updated_at": "2021-03-09T08:10:00+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:02+00:00", "updated_at": "2021-03-09T08:10:02+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:03+00:00", "updated_at": "2021-03-09T08:10:03+00:00" }, { "name": "CVE-2019-3882", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:04+00:00", "updated_at": "2021-03-09T08:10:04+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:05+00:00", "updated_at": "2021-03-09T08:10:05+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:06+00:00", "updated_at": "2021-03-09T08:10:06+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:07+00:00", "updated_at": "2021-03-09T08:10:07+00:00" }, { "name": "CVE-2019-10639", "risk": 75, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:08+00:00", "updated_at": "2021-03-09T08:10:08+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:09+00:00", "updated_at": "2021-03-09T08:10:09+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:10+00:00", "updated_at": "2021-03-09T08:10:10+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:11+00:00", "updated_at": "2021-03-09T08:10:11+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:12+00:00", "updated_at": "2021-03-09T08:10:12+00:00" }, { "name": "CVE-2019-15239", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": null, "created_at": "2021-03-09T08:10:13+00:00", "updated_at": "2021-03-09T08:10:13+00:00" }, { "name": "CVE-2015-8553", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:46+00:00", "updated_at": "2021-07-19T14:00:46+00:00" }, { "name": "CVE-2017-18509", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:46+00:00", "updated_at": "2021-07-19T14:00:46+00:00" }, { "name": "CVE-2018-5995", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:47+00:00", "updated_at": "2021-07-19T14:00:47+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:47+00:00", "updated_at": "2021-07-19T14:00:47+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:48+00:00", "updated_at": "2021-07-19T14:00:48+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:48+00:00", "updated_at": "2021-07-19T14:00:48+00:00" }, { "name": "CVE-2019-3882", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:49+00:00", "updated_at": "2021-07-19T14:00:49+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:49+00:00", "updated_at": "2021-07-19T14:00:49+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:50+00:00", "updated_at": "2021-07-19T14:00:50+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:50+00:00", "updated_at": "2021-07-19T14:00:50+00:00" }, { "name": "CVE-2019-10639", "risk": 75, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:51+00:00", "updated_at": "2021-07-19T14:00:51+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:51+00:00", "updated_at": "2021-07-19T14:00:51+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:52+00:00", "updated_at": "2021-07-19T14:00:52+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:52+00:00", "updated_at": "2021-07-19T14:00:52+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:53+00:00", "updated_at": "2021-07-19T14:00:53+00:00" }, { "name": "CVE-2019-15239", "risk": 78, "source": "DSA", "sid": "DSA-4497-1", "fixed": { "sha256": "b50de822dc499c4b8090c0b5ecac373a815bc31cce79909c30228f9ee0e100ff", "name": "libcpupower-dev", "version": "4.9.168-1+deb9u5", "filename": "libcpupower-dev_4.9.168-1+deb9u5_i386.deb" }, "created_at": "2021-07-19T14:00:53+00:00", "updated_at": "2021-07-19T14:00:53+00:00" } ], "risk": 93, "vulnerable": 93, "outdated": 0, "malicious": 0, "created_at": "2019-07-20T15:19:08+00:00", "updated_at": "2021-03-09T01:38:17+00:00", "deleted_at": null }