6cb699be426cf9ee7d1920695ec076e9cf6e5f2a1eea5db60bf86ffce9002cb7
da420a10ae3181797172075d06f0288bb771127f
595a1455d54f1473e62f0833b868d06b
5.10.127-1
libcpupower-dev_5.10.127-1_amd64.deb
500
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libcpupower1 (= 5.10.127-1)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "6cb699be426cf9ee7d1920695ec076e9cf6e5f2a1eea5db60bf86ffce9002cb7", "sha1": "da420a10ae3181797172075d06f0288bb771127f", "md5": "595a1455d54f1473e62f0833b868d06b", "type": "DEB", "arch": "AMD64", "name": "libcpupower-dev", "filename": "libcpupower-dev_5.10.127-1_amd64.deb", "size": 500, "description": "CPU frequency and voltage scaling tools for Linux (development files)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package is needed to compile programs against libcpupower.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libcpupower1 (= 5.10.127-1)", "applications": [], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:15:35+00:00", "updated_at": "2022-07-27T20:15:35+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:09+00:00", "updated_at": "2022-07-27T20:16:09+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:41+00:00", "updated_at": "2022-07-27T20:16:41+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:14+00:00", "updated_at": "2022-07-27T20:17:14+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:46+00:00", "updated_at": "2022-07-27T20:17:46+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:18+00:00", "updated_at": "2022-07-27T20:18:18+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:49+00:00", "updated_at": "2022-07-27T20:18:49+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:18+00:00", "updated_at": "2022-07-27T20:19:18+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:50+00:00", "updated_at": "2022-07-27T20:19:50+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T07:14:06+00:00", "updated_at": "2022-07-02T02:06:45+00:00", "deleted_at": null }