Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (9)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that supports these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: abbcf2ff84c1ce0eb244858f39287e366cc6a885f7b206c2389c46e144eb4491
  • SHA1: 1dec60acfedcc9558210ae2ed8856521dfb5862d
  • MD5: 4fdc43539eaca9f1c4a6a9f118288765
Information
  • Version: 5.10.127-1
  • Filename: linux-cpupower_5.10.127-1_amd64.deb
  • Size: 806
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
1242720
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
316800
cpupower
/usr/bin/cpupower
640320

Vulnerabilities

NameRiskSourceFixed
CVE-2021-3365578DSA
DSA-5191-1
CVE-2022-23180DSA
DSA-5191-1
CVE-2022-263650DSA
DSA-5191-1
CVE-2022-337400DSA
DSA-5191-1
CVE-2022-337410DSA
DSA-5191-1
CVE-2022-337420DSA
DSA-5191-1
CVE-2022-337430DSA
DSA-5191-1
CVE-2022-337440DSA
DSA-5191-1
CVE-2022-349180DSA
DSA-5191-1

Raw Object

{
  "sha256": "abbcf2ff84c1ce0eb244858f39287e366cc6a885f7b206c2389c46e144eb4491",
  "sha1": "1dec60acfedcc9558210ae2ed8856521dfb5862d",
  "md5": "4fdc43539eaca9f1c4a6a9f118288765",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_5.10.127-1_amd64.deb",
  "size": 806,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "5.10.127-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "c5391e2eb5b86f56c1ec2bd8a9a027bd0607e683676adc0b11e20e5726422f23",
      "sha1": "8e8c78bd7d7a5b8985d3f96c48688d5b700a75f9",
      "md5": "0a4f27e0bc41d3001147123ea98f5f1f",
      "name": "turbostat",
      "size": 124272,
      "description": null,
      "package": 3818286,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:00:20+00:00",
      "updated_at": "2022-07-02T03:00:20+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "f272d0aa3bc8915663b5da31cb5b705c5fd63d3a98106f21ff307c42b1cadfcc",
      "sha1": "a52da56a6f29bf38304945f0d21be5bfdff7dcc8",
      "md5": "29687d2ba59f78bf4865f24534b138f9",
      "name": "x86_energy_perf_policy",
      "size": 31680,
      "description": null,
      "package": 3818286,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:00:20+00:00",
      "updated_at": "2022-07-02T03:00:20+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "1f64cf7705260a21e628e87e905e0dd6ec79618d5005c5c8787928dd32fd014d",
      "sha1": "63c8e8996cb3bae5837e3506528fa569967b5da0",
      "md5": "2bdd99c1cddd475ea21774a01c16fd05",
      "name": "cpupower",
      "size": 64032,
      "description": null,
      "package": 3818286,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:00:20+00:00",
      "updated_at": "2022-07-02T03:00:20+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:15:48+00:00",
      "updated_at": "2022-07-27T20:15:48+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:21+00:00",
      "updated_at": "2022-07-27T20:16:21+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:53+00:00",
      "updated_at": "2022-07-27T20:16:53+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:25+00:00",
      "updated_at": "2022-07-27T20:17:25+00:00"
    },
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:58+00:00",
      "updated_at": "2022-07-27T20:17:58+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:28+00:00",
      "updated_at": "2022-07-27T20:18:28+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:59+00:00",
      "updated_at": "2022-07-27T20:18:59+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:30+00:00",
      "updated_at": "2022-07-27T20:19:30+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:20:01+00:00",
      "updated_at": "2022-07-27T20:20:01+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-07-01T07:14:06+00:00",
  "updated_at": "2022-07-02T02:00:20+00:00",
  "deleted_at": null
}