b8341f985ca0e278e2f604ab8ba60cbe31be6ab1c015b850f3996cd7a1b112ad
fae8f7f551647628bf235cc0c2251cf8fe0a55dc
3c1be8a7abb379f176cdf180d02faef2
4.19.67-2+deb10u2~bpo9+1
linux-cpupower_4.19.67-2+deb10u2~bpo9+1_i386.deb
614
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
turbostat /usr/sbin/turbostat | 117916 | 0 | ||
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 30592 | 0 | ||
cpupower /usr/bin/cpupower | 61892 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2018-12207 | 65 | DSA DSA-4564-1 | linux-kbuild-4.19 4.19.67-2+deb10u2 |
CVE-2019-0154 | 55 | DSA DSA-4564-1 | linux-kbuild-4.19 4.19.67-2+deb10u2 |
CVE-2019-0155 | 78 | DSA DSA-4564-1 | linux-kbuild-4.19 4.19.67-2+deb10u2 |
CVE-2019-11135 | 65 | DSA DSA-4564-1 | linux-kbuild-4.19 4.19.67-2+deb10u2 |
CVE-2018-12207 | 65 | DSA DSA-4564-1 | |
CVE-2019-0154 | 55 | DSA DSA-4564-1 | |
CVE-2019-0155 | 78 | DSA DSA-4564-1 | |
CVE-2019-11135 | 65 | DSA DSA-4564-1 | |
CVE-2018-12207 | 65 | DSA DSA-4564-1 | linux-cpupower 4.19.67-2+deb10u2 |
CVE-2019-0154 | 55 | DSA DSA-4564-1 | linux-cpupower 4.19.67-2+deb10u2 |
CVE-2019-0155 | 78 | DSA DSA-4564-1 | linux-cpupower 4.19.67-2+deb10u2 |
CVE-2019-11135 | 65 | DSA DSA-4564-1 | linux-cpupower 4.19.67-2+deb10u2 |
{ "sha256": "b8341f985ca0e278e2f604ab8ba60cbe31be6ab1c015b850f3996cd7a1b112ad", "sha1": "fae8f7f551647628bf235cc0c2251cf8fe0a55dc", "md5": "3c1be8a7abb379f176cdf180d02faef2", "type": "DEB", "arch": "I386", "name": "linux-cpupower", "filename": "linux-cpupower_4.19.67-2+deb10u2~bpo9+1_i386.deb", "size": 614, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.19.67-2+deb10u2~bpo9+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/turbostat", "sha256": "45ed4d91fb1e481319b472bae072ef79b25fdb1297bc1f3077048a52d234b2eb", "sha1": "10f4a2457fa721ff90b07bc0ea008933289cc6a1", "md5": "c0de16bab80d2781e749184312a58002", "name": "turbostat", "size": 117916, "description": null, "package": 994000, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T08:08:43+00:00", "updated_at": "2021-03-07T08:08:43+00:00", "deleted_at": null }, { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "fa88cb8985a474e7d0644fbcec86081e56e8057583aca22445fcfb2afff987b3", "sha1": "bdb38104049ad37f7d9d2ac9b282de681a9fdbef", "md5": "2bb2ccdab13b4a862fb37bdca9f1914b", "name": "x86_energy_perf_policy", "size": 30592, "description": null, "package": 994000, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T08:08:43+00:00", "updated_at": "2021-03-07T08:08:43+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "c867435a277da04f44885c1d3105028ef9537c02f7b4a2036a7cba237e199c41", "sha1": "ab6139d84c9a22c2420b8dd5fd74e47ba45c54da", "md5": "2d44e21dc3953aec6a76bc1a8a0302a9", "name": "cpupower", "size": 61892, "description": null, "package": 994000, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T08:08:44+00:00", "updated_at": "2021-03-07T08:08:44+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2018-12207", "risk": 65, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41", "name": "linux-kbuild-4.19", "version": "4.19.67-2+deb10u2", "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:00:54+00:00", "updated_at": "2021-03-08T10:00:54+00:00" }, { "name": "CVE-2019-0154", "risk": 55, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41", "name": "linux-kbuild-4.19", "version": "4.19.67-2+deb10u2", "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:00:55+00:00", "updated_at": "2021-03-08T10:00:55+00:00" }, { "name": "CVE-2019-0155", "risk": 78, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41", "name": "linux-kbuild-4.19", "version": "4.19.67-2+deb10u2", "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:00:56+00:00", "updated_at": "2021-03-08T10:00:56+00:00" }, { "name": "CVE-2019-11135", "risk": 65, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41", "name": "linux-kbuild-4.19", "version": "4.19.67-2+deb10u2", "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:00:57+00:00", "updated_at": "2021-03-08T10:00:57+00:00" }, { "name": "CVE-2018-12207", "risk": 65, "source": "DSA", "sid": "DSA-4564-1", "fixed": null, "created_at": "2021-03-08T13:28:36+00:00", "updated_at": "2021-03-08T13:28:36+00:00" }, { "name": "CVE-2019-0154", "risk": 55, "source": "DSA", "sid": "DSA-4564-1", "fixed": null, "created_at": "2021-03-08T13:29:36+00:00", "updated_at": "2021-03-08T13:29:36+00:00" }, { "name": "CVE-2019-0155", "risk": 78, "source": "DSA", "sid": "DSA-4564-1", "fixed": null, "created_at": "2021-03-08T13:30:02+00:00", "updated_at": "2021-03-08T13:30:02+00:00" }, { "name": "CVE-2019-11135", "risk": 65, "source": "DSA", "sid": "DSA-4564-1", "fixed": null, "created_at": "2021-03-08T13:30:14+00:00", "updated_at": "2021-03-08T13:30:14+00:00" }, { "name": "CVE-2018-12207", "risk": 65, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396", "name": "linux-cpupower", "version": "4.19.67-2+deb10u2", "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-09T08:06:35+00:00", "updated_at": "2021-03-09T08:06:35+00:00" }, { "name": "CVE-2019-0154", "risk": 55, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396", "name": "linux-cpupower", "version": "4.19.67-2+deb10u2", "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-09T08:06:36+00:00", "updated_at": "2021-03-09T08:06:36+00:00" }, { "name": "CVE-2019-0155", "risk": 78, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396", "name": "linux-cpupower", "version": "4.19.67-2+deb10u2", "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-09T08:06:37+00:00", "updated_at": "2021-03-09T08:06:37+00:00" }, { "name": "CVE-2019-11135", "risk": 65, "source": "DSA", "sid": "DSA-4564-1", "fixed": { "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396", "name": "linux-cpupower", "version": "4.19.67-2+deb10u2", "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb" }, "created_at": "2021-03-09T08:06:38+00:00", "updated_at": "2021-03-09T08:06:38+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2019-11-18T19:07:33+00:00", "updated_at": "2021-03-07T08:08:43+00:00", "deleted_at": null }