8d8686480175e26a9143df20b65cefd3c430bbc42207129d24b90e800cc90bcd
83a7da962d7ba7fc915e499ecca6e20022f01aba
16c37652a65b5c3ee8236879ff3371ca
4.9.168-1+deb9u2
linux-cpupower_4.9.168-1+deb9u2_i386.deb
847
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 72252 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 9760 | 0 | ||
cpupower /usr/bin/cpupower | 61784 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-3846 | 88 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-5489 | 55 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-9500 | 83 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-9503 | 83 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-10126 | 98 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11477 | 78 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11478 | 75 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11479 | 75 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11486 | 70 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11599 | 70 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11815 | 93 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11833 | 55 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
CVE-2019-11884 | 33 | DSA DSA-4465-1 | linux-cpupower 4.9.168-1+deb9u3 |
{ "sha256": "8d8686480175e26a9143df20b65cefd3c430bbc42207129d24b90e800cc90bcd", "sha1": "83a7da962d7ba7fc915e499ecca6e20022f01aba", "md5": "16c37652a65b5c3ee8236879ff3371ca", "type": "DEB", "arch": "I386", "name": "linux-cpupower", "filename": "linux-cpupower_4.9.168-1+deb9u2_i386.deb", "size": 847, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.9.168-1+deb9u2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "ca9a41805b3ae0264c12ab6632ccbdd1f36a66b0314afa48fa2c771a277bee63", "sha1": "2c4dab781cf45cdaa8385840d10fbf0470132f56", "md5": "401cde4897b1c590b99deecc13532ac0", "name": "turbostat", "size": 72252, "description": null, "package": 1030110, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T19:34:35+00:00", "updated_at": "2021-03-07T19:34:35+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "0afc2ba2632e7f918f31d0f6c6326264db204de79eec7aa8676d52b353bf1af0", "sha1": "8ef90d1dc082cf9b2d2b72aa2f1a014bf81d368e", "md5": "5b62b4f27379ec1e4ef1ae14be9daeca", "name": "x86_energy_perf_policy", "size": 9760, "description": null, "package": 1030110, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T19:34:35+00:00", "updated_at": "2021-03-07T19:34:35+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "d6d5aa624b4ae7329ebb95728453dcc321bad7a10ce8ca6bd193034563e83876", "sha1": "957260e52f2221563ac7c57153e053881b31dd99", "md5": "e86e9fa024aa85009bcfc7b80a25e8c6", "name": "cpupower", "size": 61784, "description": null, "package": 1030110, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T19:34:35+00:00", "updated_at": "2021-03-07T19:34:35+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2019-3846", "risk": 88, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:54+00:00", "updated_at": "2021-03-08T10:04:54+00:00" }, { "name": "CVE-2019-5489", "risk": 55, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:55+00:00", "updated_at": "2021-03-08T10:04:55+00:00" }, { "name": "CVE-2019-9500", "risk": 83, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:55+00:00", "updated_at": "2021-03-08T10:04:55+00:00" }, { "name": "CVE-2019-9503", "risk": 83, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:56+00:00", "updated_at": "2021-03-08T10:04:56+00:00" }, { "name": "CVE-2019-10126", "risk": 98, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:57+00:00", "updated_at": "2021-03-08T10:04:57+00:00" }, { "name": "CVE-2019-11477", "risk": 78, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:58+00:00", "updated_at": "2021-03-08T10:04:58+00:00" }, { "name": "CVE-2019-11478", "risk": 75, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:59+00:00", "updated_at": "2021-03-08T10:04:59+00:00" }, { "name": "CVE-2019-11479", "risk": 75, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:04:59+00:00", "updated_at": "2021-03-08T10:04:59+00:00" }, { "name": "CVE-2019-11486", "risk": 70, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:05:00+00:00", "updated_at": "2021-03-08T10:05:00+00:00" }, { "name": "CVE-2019-11599", "risk": 70, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:05:01+00:00", "updated_at": "2021-03-08T10:05:01+00:00" }, { "name": "CVE-2019-11815", "risk": 93, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:05:02+00:00", "updated_at": "2021-03-08T10:05:02+00:00" }, { "name": "CVE-2019-11833", "risk": 55, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:05:02+00:00", "updated_at": "2021-03-08T10:05:02+00:00" }, { "name": "CVE-2019-11884", "risk": 33, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51", "name": "linux-cpupower", "version": "4.9.168-1+deb9u3", "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb" }, "created_at": "2021-03-08T10:05:03+00:00", "updated_at": "2021-03-08T10:05:03+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 0, "malicious": 0, "created_at": "2019-05-14T13:58:00+00:00", "updated_at": "2021-03-07T19:34:35+00:00", "deleted_at": null }