b2417af91db55e90949d482075d46b9b0888b58be2ef7f8e8d0b458fc55cb9a8
abddd0734fc344655a706b8346e7f3ba8d467e1e
379c139c4bc69544f7385e52779b5ee5
4.19.67-2+deb10u1~bpo9+1
linux-cpupower_4.19.67-2+deb10u1~bpo9+1_i386.deb
613
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 117916 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 30592 | 0 | ||
cpupower /usr/bin/cpupower | 61892 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-14821 | 88 | DSA DSA-4531-1 | linux-cpupower 4.19.67-2+deb10u1 |
CVE-2019-14835 | 78 | DSA DSA-4531-1 | linux-cpupower 4.19.67-2+deb10u1 |
CVE-2019-15117 | 78 | DSA DSA-4531-1 | linux-cpupower 4.19.67-2+deb10u1 |
CVE-2019-15118 | 55 | DSA DSA-4531-1 | linux-cpupower 4.19.67-2+deb10u1 |
CVE-2019-15902 | 56 | DSA DSA-4531-1 | linux-cpupower 4.19.67-2+deb10u1 |
{ "sha256": "b2417af91db55e90949d482075d46b9b0888b58be2ef7f8e8d0b458fc55cb9a8", "sha1": "abddd0734fc344655a706b8346e7f3ba8d467e1e", "md5": "379c139c4bc69544f7385e52779b5ee5", "type": "DEB", "arch": "I386", "name": "linux-cpupower", "filename": "linux-cpupower_4.19.67-2+deb10u1~bpo9+1_i386.deb", "size": 613, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.19.67-2+deb10u1~bpo9+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "64d9196b2137833a879f26f840eb26d443cbb87cb5c77fbab9bff2a4e0b12a49", "sha1": "505c5a762bb740d91d3a2a28b0e7043d2c8bba0d", "md5": "f187455f7bebf1073e6377f8b369fafb", "name": "turbostat", "size": 117916, "description": null, "package": 912692, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-06T18:52:07+00:00", "updated_at": "2021-03-06T18:52:07+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "b1a2b5991b60327b6fed826c1c565dacfbc85c9f9783f000dbd4bf80b9d7c9ed", "sha1": "0b85b6b00e06184b620473e98c5929d56084bb57", "md5": "5657ae908e3dda2b89134e67435f2f8b", "name": "x86_energy_perf_policy", "size": 30592, "description": null, "package": 912692, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-06T18:52:07+00:00", "updated_at": "2021-03-06T18:52:07+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "ac2c397cbcf4a844b726b1afdaa386ad53a349baf91997ebbe9a18559db09006", "sha1": "60f1bf0517c1f33bfc07f31d837e8b21051bd938", "md5": "f38e13ea5ad64f26427ca1699e29f715", "name": "cpupower", "size": 61892, "description": null, "package": 912692, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-06T18:52:07+00:00", "updated_at": "2021-03-06T18:52:07+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2019-14821", "risk": 88, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "7f13a62c9a8eb273b1d45d5e9ecc7d96f7271484545c8fa3fb857a6e3a9e2ae5", "name": "linux-cpupower", "version": "4.19.67-2+deb10u1", "filename": "linux-cpupower_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:46+00:00", "updated_at": "2021-03-08T10:01:46+00:00" }, { "name": "CVE-2019-14835", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "7f13a62c9a8eb273b1d45d5e9ecc7d96f7271484545c8fa3fb857a6e3a9e2ae5", "name": "linux-cpupower", "version": "4.19.67-2+deb10u1", "filename": "linux-cpupower_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:47+00:00", "updated_at": "2021-03-08T10:01:47+00:00" }, { "name": "CVE-2019-15117", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "7f13a62c9a8eb273b1d45d5e9ecc7d96f7271484545c8fa3fb857a6e3a9e2ae5", "name": "linux-cpupower", "version": "4.19.67-2+deb10u1", "filename": "linux-cpupower_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:47+00:00", "updated_at": "2021-03-08T10:01:47+00:00" }, { "name": "CVE-2019-15118", "risk": 55, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "7f13a62c9a8eb273b1d45d5e9ecc7d96f7271484545c8fa3fb857a6e3a9e2ae5", "name": "linux-cpupower", "version": "4.19.67-2+deb10u1", "filename": "linux-cpupower_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:48+00:00", "updated_at": "2021-03-08T10:01:48+00:00" }, { "name": "CVE-2019-15902", "risk": 56, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "7f13a62c9a8eb273b1d45d5e9ecc7d96f7271484545c8fa3fb857a6e3a9e2ae5", "name": "linux-cpupower", "version": "4.19.67-2+deb10u1", "filename": "linux-cpupower_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:49+00:00", "updated_at": "2021-03-08T10:01:49+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2019-10-02T04:27:58+00:00", "updated_at": "2021-03-06T18:52:07+00:00", "deleted_at": null }