7647a65b71226c3890599a225ecb36746fdc267fec198abd3164af8a9679e648
5f6c93bcb1b0131abbf50f981d6fcf97e9644f26
1c3dd42c9d52cc6afb08c968eb17dee4
5.10.158-2
libcpupower-dev_5.10.158-2_i386.deb
553
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libcpupower1 (= 5.10.158-2)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | libcpupower-dev 5.10.162-1 |
{ "sha256": "7647a65b71226c3890599a225ecb36746fdc267fec198abd3164af8a9679e648", "sha1": "5f6c93bcb1b0131abbf50f981d6fcf97e9644f26", "md5": "1c3dd42c9d52cc6afb08c968eb17dee4", "type": "DEB", "arch": "I386", "name": "libcpupower-dev", "filename": "libcpupower-dev_5.10.158-2_i386.deb", "size": 553, "description": "CPU frequency and voltage scaling tools for Linux (development files)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package is needed to compile programs against libcpupower.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libcpupower1 (= 5.10.158-2)", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:32+00:00", "updated_at": "2023-01-25T10:38:32+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:36+00:00", "updated_at": "2023-01-25T10:38:36+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:43+00:00", "updated_at": "2023-01-25T10:38:43+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "947e2fce2e9230b0dd3f475859e15c998151858f16fb7270b869c29eff6a6c28", "name": "libcpupower-dev", "version": "5.10.162-1", "filename": "libcpupower-dev_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T05:32:51+00:00", "updated_at": "2022-12-16T10:14:24+00:00", "deleted_at": null }