Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (9)

libcpupower-dev

Hashes
CPU frequency and voltage scaling tools for Linux (development files) libcpupower is a library for inspecting and controlling cpufreq and cpuidle tunables. This package is needed to compile programs against libcpupower.
  • SHA256: 6cb699be426cf9ee7d1920695ec076e9cf6e5f2a1eea5db60bf86ffce9002cb7
  • SHA1: da420a10ae3181797172075d06f0288bb771127f
  • MD5: 595a1455d54f1473e62f0833b868d06b
Information
  • Version: 5.10.127-1
  • Filename: libcpupower-dev_5.10.127-1_amd64.deb
  • Size: 500
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libcpupower1 (= 5.10.127-1)

Vulnerabilities

NameRiskSourceFixed
CVE-2021-3365578DSA
DSA-5191-1
CVE-2022-23180DSA
DSA-5191-1
CVE-2022-263650DSA
DSA-5191-1
CVE-2022-337400DSA
DSA-5191-1
CVE-2022-337410DSA
DSA-5191-1
CVE-2022-337420DSA
DSA-5191-1
CVE-2022-337430DSA
DSA-5191-1
CVE-2022-337440DSA
DSA-5191-1
CVE-2022-349180DSA
DSA-5191-1

Raw Object

{
  "sha256": "6cb699be426cf9ee7d1920695ec076e9cf6e5f2a1eea5db60bf86ffce9002cb7",
  "sha1": "da420a10ae3181797172075d06f0288bb771127f",
  "md5": "595a1455d54f1473e62f0833b868d06b",
  "type": "DEB",
  "arch": "AMD64",
  "name": "libcpupower-dev",
  "filename": "libcpupower-dev_5.10.127-1_amd64.deb",
  "size": 500,
  "description": "CPU frequency and voltage scaling tools for Linux (development files)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package is needed to compile programs against libcpupower.",
  "url": "https://www.kernel.org/",
  "version": "5.10.127-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libcpupower1 (= 5.10.127-1)",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:15:35+00:00",
      "updated_at": "2022-07-27T20:15:35+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:09+00:00",
      "updated_at": "2022-07-27T20:16:09+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:41+00:00",
      "updated_at": "2022-07-27T20:16:41+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:14+00:00",
      "updated_at": "2022-07-27T20:17:14+00:00"
    },
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:46+00:00",
      "updated_at": "2022-07-27T20:17:46+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:18+00:00",
      "updated_at": "2022-07-27T20:18:18+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:49+00:00",
      "updated_at": "2022-07-27T20:18:49+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:18+00:00",
      "updated_at": "2022-07-27T20:19:18+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:50+00:00",
      "updated_at": "2022-07-27T20:19:50+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-07-01T07:14:06+00:00",
  "updated_at": "2022-07-02T02:06:45+00:00",
  "deleted_at": null
}