Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (12)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that support these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: b63d45667826cc2c7f08b96c2bfaa8b1b70d65e6a3adc59e3f5b8cc5163a62c8
  • SHA1: 7b323cb03d29551e34f657578694e213dc0dacd7
  • MD5: cc2648fe6533cdf8f22bace1e72bb822
Information
  • Version: 4.19.37-5+deb10u2~bpo9+1
  • Filename: linux-cpupower_4.19.37-5+deb10u2~bpo9+1_amd64.deb
  • Size: 552
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
1075440
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
276160
cpupower
/usr/bin/cpupower
600080

Vulnerabilities

NameRiskSourceFixed
CVE-2018-2083693DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-112555DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-199978DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1020755DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1063865DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1281770DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1298455DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1323370DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1363168DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1364855DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1428368DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2
CVE-2019-1428462DSA
DSA-4495-1
linux-cpupower
4.19.37-5+deb10u2

Raw Object

{
  "sha256": "b63d45667826cc2c7f08b96c2bfaa8b1b70d65e6a3adc59e3f5b8cc5163a62c8",
  "sha1": "7b323cb03d29551e34f657578694e213dc0dacd7",
  "md5": "cc2648fe6533cdf8f22bace1e72bb822",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_4.19.37-5+deb10u2~bpo9+1_amd64.deb",
  "size": 552,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "4.19.37-5+deb10u2~bpo9+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "2e938e8c5855971c8b61c48cd5e53253b04b41ad7569416d326f17e5009faf20",
      "sha1": "b8736bb979a2bd2cb38a4c5565f051e0972f5ae3",
      "md5": "e6cae52134175a977f179fc72a7c88aa",
      "name": "turbostat",
      "size": 107544,
      "description": null,
      "package": 834601,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T09:41:34+00:00",
      "updated_at": "2021-03-06T09:41:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "43739dc93a473101089870966d8d1b6e5d0f3f298a34a2da354839a99e97bffe",
      "sha1": "968d65ed3cba44ff4b2ac41f6084da86cd954bdc",
      "md5": "f8725f348dde80497d1b911308a2debd",
      "name": "x86_energy_perf_policy",
      "size": 27616,
      "description": null,
      "package": 834601,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T09:41:34+00:00",
      "updated_at": "2021-03-06T09:41:34+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "7c460835c9098081afbca40a015dd04c887b437b451a526c50f015792a818f25",
      "sha1": "94bf4571e4a8ec13f241296cab555cc0ec81ed99",
      "md5": "2a4509ccd2d902a61d4c33f1e671dca8",
      "name": "cpupower",
      "size": 60008,
      "description": null,
      "package": 834601,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-06T09:41:34+00:00",
      "updated_at": "2021-03-06T09:41:34+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2018-20836",
      "risk": 93,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:10+00:00",
      "updated_at": "2021-03-08T10:03:10+00:00"
    },
    {
      "name": "CVE-2019-1125",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:11+00:00",
      "updated_at": "2021-03-08T10:03:11+00:00"
    },
    {
      "name": "CVE-2019-1999",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:12+00:00",
      "updated_at": "2021-03-08T10:03:12+00:00"
    },
    {
      "name": "CVE-2019-10207",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:13+00:00",
      "updated_at": "2021-03-08T10:03:13+00:00"
    },
    {
      "name": "CVE-2019-10638",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:14+00:00",
      "updated_at": "2021-03-08T10:03:14+00:00"
    },
    {
      "name": "CVE-2019-12817",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:15+00:00",
      "updated_at": "2021-03-08T10:03:15+00:00"
    },
    {
      "name": "CVE-2019-12984",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:16+00:00",
      "updated_at": "2021-03-08T10:03:16+00:00"
    },
    {
      "name": "CVE-2019-13233",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:17+00:00",
      "updated_at": "2021-03-08T10:03:17+00:00"
    },
    {
      "name": "CVE-2019-13631",
      "risk": 68,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:18+00:00",
      "updated_at": "2021-03-08T10:03:18+00:00"
    },
    {
      "name": "CVE-2019-13648",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:19+00:00",
      "updated_at": "2021-03-08T10:03:19+00:00"
    },
    {
      "name": "CVE-2019-14283",
      "risk": 68,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:20+00:00",
      "updated_at": "2021-03-08T10:03:20+00:00"
    },
    {
      "name": "CVE-2019-14284",
      "risk": 62,
      "source": "DSA",
      "sid": "DSA-4495-1",
      "fixed": {
        "sha256": "66dbf4760d971c533b16df1c1cf94e2fe1c7ec2636145cb910d5f18f501807ce",
        "name": "linux-cpupower",
        "version": "4.19.37-5+deb10u2",
        "filename": "linux-cpupower_4.19.37-5+deb10u2_amd64.deb"
      },
      "created_at": "2021-03-08T10:03:21+00:00",
      "updated_at": "2021-03-08T10:03:21+00:00"
    }
  ],
  "risk": 93,
  "vulnerable": 93,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-08-22T08:48:09+00:00",
  "updated_at": "2021-03-06T09:41:34+00:00",
  "deleted_at": null
}