abbcf2ff84c1ce0eb244858f39287e366cc6a885f7b206c2389c46e144eb4491
1dec60acfedcc9558210ae2ed8856521dfb5862d
4fdc43539eaca9f1c4a6a9f118288765
5.10.127-1
linux-cpupower_5.10.127-1_amd64.deb
806
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 124272 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 31680 | 0 | ||
cpupower /usr/bin/cpupower | 64032 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "abbcf2ff84c1ce0eb244858f39287e366cc6a885f7b206c2389c46e144eb4491", "sha1": "1dec60acfedcc9558210ae2ed8856521dfb5862d", "md5": "4fdc43539eaca9f1c4a6a9f118288765", "type": "DEB", "arch": "AMD64", "name": "linux-cpupower", "filename": "linux-cpupower_5.10.127-1_amd64.deb", "size": 806, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "c5391e2eb5b86f56c1ec2bd8a9a027bd0607e683676adc0b11e20e5726422f23", "sha1": "8e8c78bd7d7a5b8985d3f96c48688d5b700a75f9", "md5": "0a4f27e0bc41d3001147123ea98f5f1f", "name": "turbostat", "size": 124272, "description": null, "package": 3818286, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:00:20+00:00", "updated_at": "2022-07-02T03:00:20+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "f272d0aa3bc8915663b5da31cb5b705c5fd63d3a98106f21ff307c42b1cadfcc", "sha1": "a52da56a6f29bf38304945f0d21be5bfdff7dcc8", "md5": "29687d2ba59f78bf4865f24534b138f9", "name": "x86_energy_perf_policy", "size": 31680, "description": null, "package": 3818286, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:00:20+00:00", "updated_at": "2022-07-02T03:00:20+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "1f64cf7705260a21e628e87e905e0dd6ec79618d5005c5c8787928dd32fd014d", "sha1": "63c8e8996cb3bae5837e3506528fa569967b5da0", "md5": "2bdd99c1cddd475ea21774a01c16fd05", "name": "cpupower", "size": 64032, "description": null, "package": 3818286, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:00:20+00:00", "updated_at": "2022-07-02T03:00:20+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:15:48+00:00", "updated_at": "2022-07-27T20:15:48+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:21+00:00", "updated_at": "2022-07-27T20:16:21+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:53+00:00", "updated_at": "2022-07-27T20:16:53+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:25+00:00", "updated_at": "2022-07-27T20:17:25+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:58+00:00", "updated_at": "2022-07-27T20:17:58+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:28+00:00", "updated_at": "2022-07-27T20:18:28+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:59+00:00", "updated_at": "2022-07-27T20:18:59+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:30+00:00", "updated_at": "2022-07-27T20:19:30+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:20:01+00:00", "updated_at": "2022-07-27T20:20:01+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T07:14:06+00:00", "updated_at": "2022-07-02T02:00:20+00:00", "deleted_at": null }