9bb21fc55acc3387acc7cfb8d03b7b0af72380999291b5d1421b8a3a0eb4815d
2de3b335ab9ff5785f16ed0e6ae3100f00124497
4614e3e42166f8600b4d7c031e967606
4.9.210-1
linux-cpupower_4.9.210-1_amd64.deb
900
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 69432 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 10552 | 0 | ||
cpupower /usr/bin/cpupower | 59872 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-2182 | 78 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2019-5108 | 65 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2019-19319 | 65 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2019-19462 | 55 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2019-19768 | 75 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2019-20806 | 44 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2019-20811 | 55 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-0543 | 55 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-2732 | 68 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-8428 | 71 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-8647 | 61 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-8648 | 71 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-8649 | 59 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-9383 | 71 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-10711 | 59 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-10732 | 44 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-10751 | 61 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-10757 | 78 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-10942 | 54 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-11494 | 44 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-11565 | 60 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-11608 | 49 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-11609 | 49 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-11668 | 71 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-12114 | 47 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-12464 | 72 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-12652 | 47 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-12653 | 78 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-12654 | 71 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-12770 | 67 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
CVE-2020-13143 | 65 | DSA DSA-4698-1 | linux-cpupower 4.9.210-1+deb9u1 |
{ "sha256": "9bb21fc55acc3387acc7cfb8d03b7b0af72380999291b5d1421b8a3a0eb4815d", "sha1": "2de3b335ab9ff5785f16ed0e6ae3100f00124497", "md5": "4614e3e42166f8600b4d7c031e967606", "type": "DEB", "arch": "AMD64", "name": "linux-cpupower", "filename": "linux-cpupower_4.9.210-1_amd64.deb", "size": 900, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.9.210-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "57040da3c208a0bd0dd21bc5043e242dfd11c9a4e3b8e2380178ea66b13b0e48", "sha1": "b6fb44bcec7987c35d502645a81aa072c006e719", "md5": "e4672fc0df3f7eab0ced311686753d7f", "name": "turbostat", "size": 69432, "description": null, "package": 1244962, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-16T12:44:57+00:00", "updated_at": "2021-03-16T12:44:57+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "f9203f9b1b9b6e403a1ce0f40db5f13f4631f06a68e9a512a0a7313e521d839c", "sha1": "f7d6d27d9b7b28ca18aeb7f045f0916c9902c69d", "md5": "6a7b841042b28dda11e0c83f50cbe964", "name": "x86_energy_perf_policy", "size": 10552, "description": null, "package": 1244962, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-16T12:44:57+00:00", "updated_at": "2021-03-16T12:44:57+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "a869b95954e518eb8ae3d0253fbe3876cd59dabf3912e4413fd2f03bfbb9bb09", "sha1": "292bb5364c1817c4adbb2a0769404a4c37bb58ae", "md5": "28f7df9d9c1f61b5c185ec33bdf5f555", "name": "cpupower", "size": 59872, "description": null, "package": 1244962, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-16T12:44:57+00:00", "updated_at": "2021-03-16T12:44:57+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2019-2182", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:25+00:00", "updated_at": "2021-03-21T07:43:25+00:00" }, { "name": "CVE-2019-5108", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:26+00:00", "updated_at": "2021-03-21T07:43:26+00:00" }, { "name": "CVE-2019-19319", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:27+00:00", "updated_at": "2021-03-21T07:43:27+00:00" }, { "name": "CVE-2019-19462", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:28+00:00", "updated_at": "2021-03-21T07:43:28+00:00" }, { "name": "CVE-2019-19768", "risk": 75, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:30+00:00", "updated_at": "2021-03-21T07:43:30+00:00" }, { "name": "CVE-2019-20806", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:31+00:00", "updated_at": "2021-03-21T07:43:31+00:00" }, { "name": "CVE-2019-20811", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:32+00:00", "updated_at": "2021-03-21T07:43:32+00:00" }, { "name": "CVE-2020-0543", "risk": 55, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:33+00:00", "updated_at": "2021-03-21T07:43:33+00:00" }, { "name": "CVE-2020-2732", "risk": 68, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:34+00:00", "updated_at": "2021-03-21T07:43:34+00:00" }, { "name": "CVE-2020-8428", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:35+00:00", "updated_at": "2021-03-21T07:43:35+00:00" }, { "name": "CVE-2020-8647", "risk": 61, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:37+00:00", "updated_at": "2021-03-21T07:43:37+00:00" }, { "name": "CVE-2020-8648", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:38+00:00", "updated_at": "2021-03-21T07:43:38+00:00" }, { "name": "CVE-2020-8649", "risk": 59, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:40+00:00", "updated_at": "2021-03-21T07:43:40+00:00" }, { "name": "CVE-2020-9383", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:41+00:00", "updated_at": "2021-03-21T07:43:41+00:00" }, { "name": "CVE-2020-10711", "risk": 59, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:42+00:00", "updated_at": "2021-03-21T07:43:42+00:00" }, { "name": "CVE-2020-10732", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:43+00:00", "updated_at": "2021-03-21T07:43:43+00:00" }, { "name": "CVE-2020-10751", "risk": 61, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:45+00:00", "updated_at": "2021-03-21T07:43:45+00:00" }, { "name": "CVE-2020-10757", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:46+00:00", "updated_at": "2021-03-21T07:43:46+00:00" }, { "name": "CVE-2020-10942", "risk": 54, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:47+00:00", "updated_at": "2021-03-21T07:43:47+00:00" }, { "name": "CVE-2020-11494", "risk": 44, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:49+00:00", "updated_at": "2021-03-21T07:43:49+00:00" }, { "name": "CVE-2020-11565", "risk": 60, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:50+00:00", "updated_at": "2021-03-21T07:43:50+00:00" }, { "name": "CVE-2020-11608", "risk": 49, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:51+00:00", "updated_at": "2021-03-21T07:43:51+00:00" }, { "name": "CVE-2020-11609", "risk": 49, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:53+00:00", "updated_at": "2021-03-21T07:43:53+00:00" }, { "name": "CVE-2020-11668", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:54+00:00", "updated_at": "2021-03-21T07:43:54+00:00" }, { "name": "CVE-2020-12114", "risk": 47, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:56+00:00", "updated_at": "2021-03-21T07:43:56+00:00" }, { "name": "CVE-2020-12464", "risk": 72, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:57+00:00", "updated_at": "2021-03-21T07:43:57+00:00" }, { "name": "CVE-2020-12652", "risk": 47, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:43:58+00:00", "updated_at": "2021-03-21T07:43:58+00:00" }, { "name": "CVE-2020-12653", "risk": 78, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:44:00+00:00", "updated_at": "2021-03-21T07:44:00+00:00" }, { "name": "CVE-2020-12654", "risk": 71, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:44:00+00:00", "updated_at": "2021-03-21T07:44:00+00:00" }, { "name": "CVE-2020-12770", "risk": 67, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:44:02+00:00", "updated_at": "2021-03-21T07:44:02+00:00" }, { "name": "CVE-2020-13143", "risk": 65, "source": "DSA", "sid": "DSA-4698-1", "fixed": { "sha256": "e6d6f13081e80aed836125ecbaeb3cc274aa94a7ba812836d807292054624c12", "name": "linux-cpupower", "version": "4.9.210-1+deb9u1", "filename": "linux-cpupower_4.9.210-1+deb9u1_amd64.deb" }, "created_at": "2021-03-21T07:44:03+00:00", "updated_at": "2021-03-21T07:44:03+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2020-01-26T00:33:27+00:00", "updated_at": "2021-03-16T12:44:57+00:00", "deleted_at": null }