b02f1986a3e06cea5082612139a66e1fe6519b78fe6371d556803a6d611dc254
d0d2daffd7f7db10b0b4a871f6902ab00e402cd0
da8a0b52208021163db905c75b9eff4d
5.10.158-2
linux-cpupower_5.10.158-2_amd64.deb
859
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 124272 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 31680 | 0 | ||
cpupower /usr/bin/cpupower | 64032 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | linux-config-5.10 5.10.162-1 |
{ "sha256": "b02f1986a3e06cea5082612139a66e1fe6519b78fe6371d556803a6d611dc254", "sha1": "d0d2daffd7f7db10b0b4a871f6902ab00e402cd0", "md5": "da8a0b52208021163db905c75b9eff4d", "type": "DEB", "arch": "AMD64", "name": "linux-cpupower", "filename": "linux-cpupower_5.10.158-2_amd64.deb", "size": 859, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.17), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "8801638eda3e97c49b8fd93ffd365b36c4a87478b5bb4864d775ced992af37c1", "sha1": "9d3929c5ca79d1474332499ed4d3d2c747f0dbb3", "md5": "ea6ad53729db72c15d582ccbb7d4ccba", "name": "turbostat", "size": 124272, "description": null, "package": 4982864, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:26+00:00", "updated_at": "2022-12-16T10:14:26+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "040f357432b0561e04b0901a7abb964737876d24f3b69a309322d2958f3dedaa", "sha1": "36c2598e40ee7bb57506aec76626b20eac3ff33b", "md5": "44ae61145588e8513895b16a12003806", "name": "x86_energy_perf_policy", "size": 31680, "description": null, "package": 4982864, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:26+00:00", "updated_at": "2022-12-16T10:14:26+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "c9f2c413efd0673cb3ca0dc1dbe52e44e08b04bad7e86107d5a1ad76c5d20c68", "sha1": "0c00bd58989d871754542a8d93cf57f57af71450", "md5": "a1f0f7f8274e9eb6bd41ba0b9fae8f02", "name": "cpupower", "size": 64032, "description": null, "package": 4982864, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:26+00:00", "updated_at": "2022-12-16T10:14:26+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:33+00:00", "updated_at": "2023-01-25T10:38:33+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:37+00:00", "updated_at": "2023-01-25T10:38:37+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:44+00:00", "updated_at": "2023-01-25T10:38:44+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "2c7e061459ad1ec3ff58a6d49232057f0d03fb92b5ec954980694488d6c78178", "name": "linux-config-5.10", "version": "5.10.162-1", "filename": "linux-config-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T06:13:44+00:00", "updated_at": "2022-12-16T10:14:26+00:00", "deleted_at": null }