Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (12)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that support these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: b8341f985ca0e278e2f604ab8ba60cbe31be6ab1c015b850f3996cd7a1b112ad
  • SHA1: fae8f7f551647628bf235cc0c2251cf8fe0a55dc
  • MD5: 3c1be8a7abb379f176cdf180d02faef2
Information
  • Version: 4.19.67-2+deb10u2~bpo9+1
  • Filename: linux-cpupower_4.19.67-2+deb10u2~bpo9+1_i386.deb
  • Size: 614
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
1179160
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
305920
cpupower
/usr/bin/cpupower
618920

Vulnerabilities

NameRiskSourceFixed
CVE-2018-1220765DSA
DSA-4564-1
linux-kbuild-4.19
4.19.67-2+deb10u2
CVE-2019-015455DSA
DSA-4564-1
linux-kbuild-4.19
4.19.67-2+deb10u2
CVE-2019-015578DSA
DSA-4564-1
linux-kbuild-4.19
4.19.67-2+deb10u2
CVE-2019-1113565DSA
DSA-4564-1
linux-kbuild-4.19
4.19.67-2+deb10u2
CVE-2018-1220765DSA
DSA-4564-1
CVE-2019-015455DSA
DSA-4564-1
CVE-2019-015578DSA
DSA-4564-1
CVE-2019-1113565DSA
DSA-4564-1
CVE-2018-1220765DSA
DSA-4564-1
linux-cpupower
4.19.67-2+deb10u2
CVE-2019-015455DSA
DSA-4564-1
linux-cpupower
4.19.67-2+deb10u2
CVE-2019-015578DSA
DSA-4564-1
linux-cpupower
4.19.67-2+deb10u2
CVE-2019-1113565DSA
DSA-4564-1
linux-cpupower
4.19.67-2+deb10u2

Raw Object

{
  "sha256": "b8341f985ca0e278e2f604ab8ba60cbe31be6ab1c015b850f3996cd7a1b112ad",
  "sha1": "fae8f7f551647628bf235cc0c2251cf8fe0a55dc",
  "md5": "3c1be8a7abb379f176cdf180d02faef2",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_4.19.67-2+deb10u2~bpo9+1_i386.deb",
  "size": 614,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "4.19.67-2+deb10u2~bpo9+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "45ed4d91fb1e481319b472bae072ef79b25fdb1297bc1f3077048a52d234b2eb",
      "sha1": "10f4a2457fa721ff90b07bc0ea008933289cc6a1",
      "md5": "c0de16bab80d2781e749184312a58002",
      "name": "turbostat",
      "size": 117916,
      "description": null,
      "package": 994000,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T08:08:43+00:00",
      "updated_at": "2021-03-07T08:08:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "fa88cb8985a474e7d0644fbcec86081e56e8057583aca22445fcfb2afff987b3",
      "sha1": "bdb38104049ad37f7d9d2ac9b282de681a9fdbef",
      "md5": "2bb2ccdab13b4a862fb37bdca9f1914b",
      "name": "x86_energy_perf_policy",
      "size": 30592,
      "description": null,
      "package": 994000,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T08:08:43+00:00",
      "updated_at": "2021-03-07T08:08:43+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "c867435a277da04f44885c1d3105028ef9537c02f7b4a2036a7cba237e199c41",
      "sha1": "ab6139d84c9a22c2420b8dd5fd74e47ba45c54da",
      "md5": "2d44e21dc3953aec6a76bc1a8a0302a9",
      "name": "cpupower",
      "size": 61892,
      "description": null,
      "package": 994000,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T08:08:44+00:00",
      "updated_at": "2021-03-07T08:08:44+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41",
        "name": "linux-kbuild-4.19",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-08T10:00:54+00:00",
      "updated_at": "2021-03-08T10:00:54+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41",
        "name": "linux-kbuild-4.19",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-08T10:00:55+00:00",
      "updated_at": "2021-03-08T10:00:55+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41",
        "name": "linux-kbuild-4.19",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-08T10:00:56+00:00",
      "updated_at": "2021-03-08T10:00:56+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "9c8d3562518372a5c2051145fccc2b311772040fcc205fc17080db59dcfc7b41",
        "name": "linux-kbuild-4.19",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-kbuild-4.19_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-08T10:00:57+00:00",
      "updated_at": "2021-03-08T10:00:57+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T13:28:36+00:00",
      "updated_at": "2021-03-08T13:28:36+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T13:29:36+00:00",
      "updated_at": "2021-03-08T13:29:36+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T13:30:02+00:00",
      "updated_at": "2021-03-08T13:30:02+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": null,
      "created_at": "2021-03-08T13:30:14+00:00",
      "updated_at": "2021-03-08T13:30:14+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396",
        "name": "linux-cpupower",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-09T08:06:35+00:00",
      "updated_at": "2021-03-09T08:06:35+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396",
        "name": "linux-cpupower",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-09T08:06:36+00:00",
      "updated_at": "2021-03-09T08:06:36+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396",
        "name": "linux-cpupower",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-09T08:06:37+00:00",
      "updated_at": "2021-03-09T08:06:37+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4564-1",
      "fixed": {
        "sha256": "3a2c76ebdaa73f647e909b208fecb1a11547cbd328d82bd5761faa69d72d2396",
        "name": "linux-cpupower",
        "version": "4.19.67-2+deb10u2",
        "filename": "linux-cpupower_4.19.67-2+deb10u2_i386.deb"
      },
      "created_at": "2021-03-09T08:06:38+00:00",
      "updated_at": "2021-03-09T08:06:38+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-11-18T19:07:33+00:00",
  "updated_at": "2021-03-07T08:08:43+00:00",
  "deleted_at": null
}