Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (31)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that support these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: 9bb21fc55acc3387acc7cfb8d03b7b0af72380999291b5d1421b8a3a0eb4815d
  • SHA1: 2de3b335ab9ff5785f16ed0e6ae3100f00124497
  • MD5: 4614e3e42166f8600b4d7c031e967606
Information
  • Version: 4.9.210-1
  • Filename: linux-cpupower_4.9.210-1_amd64.deb
  • Size: 900
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
694320
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
105520
cpupower
/usr/bin/cpupower
598720

Vulnerabilities

NameRiskSourceFixed
CVE-2019-218278DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2019-510865DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2019-1931965DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2019-1946255DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2019-1976875DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2019-2080644DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2019-2081155DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-054355DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-273268DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-842871DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-864761DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-864871DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-864959DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-938371DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1071159DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1073244DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1075161DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1075778DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1094254DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1149444DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1156560DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1160849DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1160949DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1166871DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1211447DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1246472DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1265247DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1265378DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1265471DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1277067DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1
CVE-2020-1314365DSA
DSA-4698-1
linux-cpupower
4.9.210-1+deb9u1

Raw Object

{
  "sha256": "9bb21fc55acc3387acc7cfb8d03b7b0af72380999291b5d1421b8a3a0eb4815d",
  "sha1": "2de3b335ab9ff5785f16ed0e6ae3100f00124497",
  "md5": "4614e3e42166f8600b4d7c031e967606",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_4.9.210-1_amd64.deb",
  "size": 900,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "4.9.210-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "57040da3c208a0bd0dd21bc5043e242dfd11c9a4e3b8e2380178ea66b13b0e48",
      "sha1": "b6fb44bcec7987c35d502645a81aa072c006e719",
      "md5": "e4672fc0df3f7eab0ced311686753d7f",
      "name": "turbostat",
      "size": 69432,
      "description": null,
      "package": 1244962,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-16T12:44:57+00:00",
      "updated_at": "2021-03-16T12:44:57+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "f9203f9b1b9b6e403a1ce0f40db5f13f4631f06a68e9a512a0a7313e521d839c",
      "sha1": "f7d6d27d9b7b28ca18aeb7f045f0916c9902c69d",
      "md5": "6a7b841042b28dda11e0c83f50cbe964",
      "name": "x86_energy_perf_policy",
      "size": 10552,
      "description": null,
      "package": 1244962,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-16T12:44:57+00:00",
      "updated_at": "2021-03-16T12:44:57+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "a869b95954e518eb8ae3d0253fbe3876cd59dabf3912e4413fd2f03bfbb9bb09",
      "sha1": "292bb5364c1817c4adbb2a0769404a4c37bb58ae",
      "md5": "28f7df9d9c1f61b5c185ec33bdf5f555",
      "name": "cpupower",
      "size": 59872,
      "description": null,
      "package": 1244962,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-16T12:44:57+00:00",
      "updated_at": "2021-03-16T12:44:57+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2019-2182",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:25+00:00",
      "updated_at": "2021-03-21T07:43:25+00:00"
    },
    {
      "name": "CVE-2019-5108",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:26+00:00",
      "updated_at": "2021-03-21T07:43:26+00:00"
    },
    {
      "name": "CVE-2019-19319",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:27+00:00",
      "updated_at": "2021-03-21T07:43:27+00:00"
    },
    {
      "name": "CVE-2019-19462",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:28+00:00",
      "updated_at": "2021-03-21T07:43:28+00:00"
    },
    {
      "name": "CVE-2019-19768",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:30+00:00",
      "updated_at": "2021-03-21T07:43:30+00:00"
    },
    {
      "name": "CVE-2019-20806",
      "risk": 44,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:31+00:00",
      "updated_at": "2021-03-21T07:43:31+00:00"
    },
    {
      "name": "CVE-2019-20811",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:32+00:00",
      "updated_at": "2021-03-21T07:43:32+00:00"
    },
    {
      "name": "CVE-2020-0543",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:33+00:00",
      "updated_at": "2021-03-21T07:43:33+00:00"
    },
    {
      "name": "CVE-2020-2732",
      "risk": 68,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:34+00:00",
      "updated_at": "2021-03-21T07:43:34+00:00"
    },
    {
      "name": "CVE-2020-8428",
      "risk": 71,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:35+00:00",
      "updated_at": "2021-03-21T07:43:35+00:00"
    },
    {
      "name": "CVE-2020-8647",
      "risk": 61,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:37+00:00",
      "updated_at": "2021-03-21T07:43:37+00:00"
    },
    {
      "name": "CVE-2020-8648",
      "risk": 71,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:38+00:00",
      "updated_at": "2021-03-21T07:43:38+00:00"
    },
    {
      "name": "CVE-2020-8649",
      "risk": 59,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:40+00:00",
      "updated_at": "2021-03-21T07:43:40+00:00"
    },
    {
      "name": "CVE-2020-9383",
      "risk": 71,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:41+00:00",
      "updated_at": "2021-03-21T07:43:41+00:00"
    },
    {
      "name": "CVE-2020-10711",
      "risk": 59,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:42+00:00",
      "updated_at": "2021-03-21T07:43:42+00:00"
    },
    {
      "name": "CVE-2020-10732",
      "risk": 44,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:43+00:00",
      "updated_at": "2021-03-21T07:43:43+00:00"
    },
    {
      "name": "CVE-2020-10751",
      "risk": 61,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:45+00:00",
      "updated_at": "2021-03-21T07:43:45+00:00"
    },
    {
      "name": "CVE-2020-10757",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:46+00:00",
      "updated_at": "2021-03-21T07:43:46+00:00"
    },
    {
      "name": "CVE-2020-10942",
      "risk": 54,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:47+00:00",
      "updated_at": "2021-03-21T07:43:47+00:00"
    },
    {
      "name": "CVE-2020-11494",
      "risk": 44,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:49+00:00",
      "updated_at": "2021-03-21T07:43:49+00:00"
    },
    {
      "name": "CVE-2020-11565",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:50+00:00",
      "updated_at": "2021-03-21T07:43:50+00:00"
    },
    {
      "name": "CVE-2020-11608",
      "risk": 49,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:51+00:00",
      "updated_at": "2021-03-21T07:43:51+00:00"
    },
    {
      "name": "CVE-2020-11609",
      "risk": 49,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:53+00:00",
      "updated_at": "2021-03-21T07:43:53+00:00"
    },
    {
      "name": "CVE-2020-11668",
      "risk": 71,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:54+00:00",
      "updated_at": "2021-03-21T07:43:54+00:00"
    },
    {
      "name": "CVE-2020-12114",
      "risk": 47,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:56+00:00",
      "updated_at": "2021-03-21T07:43:56+00:00"
    },
    {
      "name": "CVE-2020-12464",
      "risk": 72,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:57+00:00",
      "updated_at": "2021-03-21T07:43:57+00:00"
    },
    {
      "name": "CVE-2020-12652",
      "risk": 47,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:43:58+00:00",
      "updated_at": "2021-03-21T07:43:58+00:00"
    },
    {
      "name": "CVE-2020-12653",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:44:00+00:00",
      "updated_at": "2021-03-21T07:44:00+00:00"
    },
    {
      "name": "CVE-2020-12654",
      "risk": 71,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:44:00+00:00",
      "updated_at": "2021-03-21T07:44:00+00:00"
    },
    {
      "name": "CVE-2020-12770",
      "risk": 67,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:44:02+00:00",
      "updated_at": "2021-03-21T07:44:02+00:00"
    },
    {
      "name": "CVE-2020-13143",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4698-1",
      "fixed": {
        "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12",
        "name": "linux-cpupower",
        "version": "4.9.210-1+deb9u1",
        "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb"
      },
      "created_at": "2021-03-21T07:44:03+00:00",
      "updated_at": "2021-03-21T07:44:03+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-01-26T00:33:27+00:00",
  "updated_at": "2021-03-16T12:44:57+00:00",
  "deleted_at": null
}