Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (13)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that support these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: 8d8686480175e26a9143df20b65cefd3c430bbc42207129d24b90e800cc90bcd
  • SHA1: 83a7da962d7ba7fc915e499ecca6e20022f01aba
  • MD5: 16c37652a65b5c3ee8236879ff3371ca
Information
  • Version: 4.9.168-1+deb9u2
  • Filename: linux-cpupower_4.9.168-1+deb9u2_i386.deb
  • Size: 847
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
722520
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
97600
cpupower
/usr/bin/cpupower
617840

Vulnerabilities

NameRiskSourceFixed
CVE-2019-384688DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-548955DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-950083DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-950383DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1012698DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1147778DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1147875DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1147975DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1148670DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1159970DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1181593DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1183355DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3
CVE-2019-1188433DSA
DSA-4465-1
linux-cpupower
4.9.168-1+deb9u3

Raw Object

{
  "sha256": "8d8686480175e26a9143df20b65cefd3c430bbc42207129d24b90e800cc90bcd",
  "sha1": "83a7da962d7ba7fc915e499ecca6e20022f01aba",
  "md5": "16c37652a65b5c3ee8236879ff3371ca",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_4.9.168-1+deb9u2_i386.deb",
  "size": 847,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "4.9.168-1+deb9u2",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "ca9a41805b3ae0264c12ab6632ccbdd1f36a66b0314afa48fa2c771a277bee63",
      "sha1": "2c4dab781cf45cdaa8385840d10fbf0470132f56",
      "md5": "401cde4897b1c590b99deecc13532ac0",
      "name": "turbostat",
      "size": 72252,
      "description": null,
      "package": 1030110,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T19:34:35+00:00",
      "updated_at": "2021-03-07T19:34:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "0afc2ba2632e7f918f31d0f6c6326264db204de79eec7aa8676d52b353bf1af0",
      "sha1": "8ef90d1dc082cf9b2d2b72aa2f1a014bf81d368e",
      "md5": "5b62b4f27379ec1e4ef1ae14be9daeca",
      "name": "x86_energy_perf_policy",
      "size": 9760,
      "description": null,
      "package": 1030110,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T19:34:35+00:00",
      "updated_at": "2021-03-07T19:34:35+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "d6d5aa624b4ae7329ebb95728453dcc321bad7a10ce8ca6bd193034563e83876",
      "sha1": "957260e52f2221563ac7c57153e053881b31dd99",
      "md5": "e86e9fa024aa85009bcfc7b80a25e8c6",
      "name": "cpupower",
      "size": 61784,
      "description": null,
      "package": 1030110,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T19:34:35+00:00",
      "updated_at": "2021-03-07T19:34:35+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2019-3846",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:54+00:00",
      "updated_at": "2021-03-08T10:04:54+00:00"
    },
    {
      "name": "CVE-2019-5489",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:55+00:00",
      "updated_at": "2021-03-08T10:04:55+00:00"
    },
    {
      "name": "CVE-2019-9500",
      "risk": 83,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:55+00:00",
      "updated_at": "2021-03-08T10:04:55+00:00"
    },
    {
      "name": "CVE-2019-9503",
      "risk": 83,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:56+00:00",
      "updated_at": "2021-03-08T10:04:56+00:00"
    },
    {
      "name": "CVE-2019-10126",
      "risk": 98,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:57+00:00",
      "updated_at": "2021-03-08T10:04:57+00:00"
    },
    {
      "name": "CVE-2019-11477",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:58+00:00",
      "updated_at": "2021-03-08T10:04:58+00:00"
    },
    {
      "name": "CVE-2019-11478",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:59+00:00",
      "updated_at": "2021-03-08T10:04:59+00:00"
    },
    {
      "name": "CVE-2019-11479",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:04:59+00:00",
      "updated_at": "2021-03-08T10:04:59+00:00"
    },
    {
      "name": "CVE-2019-11486",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:05:00+00:00",
      "updated_at": "2021-03-08T10:05:00+00:00"
    },
    {
      "name": "CVE-2019-11599",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:05:01+00:00",
      "updated_at": "2021-03-08T10:05:01+00:00"
    },
    {
      "name": "CVE-2019-11815",
      "risk": 93,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:05:02+00:00",
      "updated_at": "2021-03-08T10:05:02+00:00"
    },
    {
      "name": "CVE-2019-11833",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:05:02+00:00",
      "updated_at": "2021-03-08T10:05:02+00:00"
    },
    {
      "name": "CVE-2019-11884",
      "risk": 33,
      "source": "DSA",
      "sid": "DSA-4465-1",
      "fixed": {
        "sha256": "5ce911b2f95b9df43e8124ee4716003081fc4793b7683e495df188fcd7f2cd51",
        "name": "linux-cpupower",
        "version": "4.9.168-1+deb9u3",
        "filename": "linux-cpupower_4.9.168-1+deb9u3_i386.deb"
      },
      "created_at": "2021-03-08T10:05:03+00:00",
      "updated_at": "2021-03-08T10:05:03+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-05-14T13:58:00+00:00",
  "updated_at": "2021-03-07T19:34:35+00:00",
  "deleted_at": null
}