Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (14)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that supports these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: 8f87ec3591735ff9a775b3f5f0aba84a47c997447f0ce5b0c364b428de07b066
  • SHA1: 767054964b431f4771a5db135efcaac3ace4d6f6
  • MD5: 0e95163305bb9a533104ce17775bee7c
Information
  • Version: 5.10.120-1~bpo10+1
  • Filename: linux-cpupower_5.10.120-1~bpo10+1_i386.deb
  • Size: 809
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
1346200
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
346760
cpupower
/usr/bin/cpupower
700360

Vulnerabilities

NameRiskSourceFixed
CVE-2022-04940DSA
DSA-5161-1
CVE-2022-085455DSA
DSA-5161-1
CVE-2022-101291DSA
DSA-5161-1
CVE-2022-172970DSA
DSA-5161-1
CVE-2022-17860DSA
DSA-5161-1
CVE-2022-17890DSA
DSA-5161-1
CVE-2022-18520DSA
DSA-5161-1
CVE-2022-322500DSA
DSA-5161-1
CVE-2022-19720DSA
DSA-5161-1
CVE-2022-197441DSA
DSA-5161-1
CVE-2022-197555DSA
DSA-5161-1
CVE-2022-2149967DSA
DSA-5161-1
CVE-2022-2889378DSA
DSA-5161-1
CVE-2022-20780DSA
DSA-5161-1

Raw Object

{
  "sha256": "8f87ec3591735ff9a775b3f5f0aba84a47c997447f0ce5b0c364b428de07b066",
  "sha1": "767054964b431f4771a5db135efcaac3ace4d6f6",
  "md5": "0e95163305bb9a533104ce17775bee7c",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_5.10.120-1~bpo10+1_i386.deb",
  "size": 809,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "5.10.120-1~bpo10+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "0028aa1cb02e6b7cca648f53201c6e641aa30b123aced85344ee260ef3b0ed06",
      "sha1": "e4c08b07c6028d1f6cb92bc581b375d921489386",
      "md5": "1ed9bc52fa5bdfa4acbbdf4f19308e88",
      "name": "turbostat",
      "size": 134620,
      "description": null,
      "package": 3794668,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:50:11+00:00",
      "updated_at": "2022-06-21T02:50:11+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "7863b416cace2ff52788c230ceaea392f0d58ea96fc32226378551e84ebc69ed",
      "sha1": "d0b7664d474628141ddb772d7b70ae5fd9039d92",
      "md5": "4f6867f46c6d2c9d591fc1b43996b5f2",
      "name": "x86_energy_perf_policy",
      "size": 34676,
      "description": null,
      "package": 3794668,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:50:11+00:00",
      "updated_at": "2022-06-21T02:50:11+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "a53543ad5737f0890ab95b0089ad8e06ba17218547790c0be13c68fda47e1850",
      "sha1": "1783cfe63ccf0fbbd8d5832a04b318b60f0182e5",
      "md5": "a455643ce695b619bfefb23107dc4c0b",
      "name": "cpupower",
      "size": 70036,
      "description": null,
      "package": 3794668,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:50:11+00:00",
      "updated_at": "2022-06-21T02:50:11+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:20+00:00",
      "updated_at": "2022-07-27T20:44:20+00:00"
    },
    {
      "name": "CVE-2022-0854",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:52+00:00",
      "updated_at": "2022-07-27T20:44:52+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:23+00:00",
      "updated_at": "2022-07-27T20:45:23+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:56+00:00",
      "updated_at": "2022-07-27T20:45:56+00:00"
    },
    {
      "name": "CVE-2022-1786",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:29+00:00",
      "updated_at": "2022-07-27T20:46:29+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:04+00:00",
      "updated_at": "2022-07-27T20:47:04+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:37+00:00",
      "updated_at": "2022-07-27T20:47:37+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:16+00:00",
      "updated_at": "2022-07-27T20:48:16+00:00"
    },
    {
      "name": "CVE-2022-1972",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:48+00:00",
      "updated_at": "2022-07-27T20:48:48+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:25+00:00",
      "updated_at": "2022-07-27T20:49:25+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:00+00:00",
      "updated_at": "2022-07-27T20:50:00+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:31+00:00",
      "updated_at": "2022-07-27T20:50:31+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:51:03+00:00",
      "updated_at": "2022-07-27T20:51:03+00:00"
    },
    {
      "name": "CVE-2022-2078",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-09-18T15:51:29+00:00",
      "updated_at": "2022-09-18T15:51:29+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-20T18:15:52+00:00",
  "updated_at": "2022-06-21T01:50:10+00:00",
  "deleted_at": null
}