Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (10)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that support these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: bd76824964eafdae1dc7c848045dfc5029e90c9ba02e60d7d306420ac6fa25f3
  • SHA1: 9d8d8ea06e3d8804444c10ce4b9de16c2d9bca39
  • MD5: 80a9386dd624cedf2833b95d6b9da466
Information
  • Version: 4.19.146-1
  • Filename: linux-cpupower_4.19.146-1_amd64.deb
  • Size: 769
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
316480
turbostat
/usr/sbin/turbostat
1156960
cpupower
/usr/bin/cpupower
640320

Vulnerabilities

NameRiskSourceFixed
CVE-2020-1235188DSA
DSA-4774-1
liblockdep-dev
4.19.152-1
CVE-2020-1235265DSA
DSA-4774-1
liblockdep-dev
4.19.152-1
CVE-2020-2521160DSA
DSA-4774-1
liblockdep-dev
4.19.152-1
CVE-2020-2564375DSA
DSA-4774-1
liblockdep-dev
4.19.152-1
CVE-2020-2564575DSA
DSA-4774-1
liblockdep-dev
4.19.152-1
CVE-2020-1235188DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-1235265DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-2521160DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-2564375DSA
DSA-4774-1
linux-cpupower
4.19.152-1
CVE-2020-2564575DSA
DSA-4774-1
linux-cpupower
4.19.152-1

Raw Object

{
  "sha256": "bd76824964eafdae1dc7c848045dfc5029e90c9ba02e60d7d306420ac6fa25f3",
  "sha1": "9d8d8ea06e3d8804444c10ce4b9de16c2d9bca39",
  "md5": "80a9386dd624cedf2833b95d6b9da466",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_4.19.146-1_amd64.deb",
  "size": 769,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "4.19.146-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "e5c4d99303397e9236366230df51b76218f51c6c8bd829df9833ae8f232c95bc",
      "sha1": "dec99e4c025c6b19ab66da194c90d5fb0c96f4d0",
      "md5": "68c1ed97671280b9ca2beb512d9433ad",
      "name": "x86_energy_perf_policy",
      "size": 31648,
      "description": null,
      "package": 1077628,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:35:42+00:00",
      "updated_at": "2021-03-09T02:35:42+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "fc26b74961c833a6a88891d3bd7b6008cb5b6584efda43ba2cd566e6ada9d9b3",
      "sha1": "aad46d899c1948ce1af7f6d1e0fde188114e9989",
      "md5": "a98494fb7815ac9337328e66bad8503f",
      "name": "turbostat",
      "size": 115696,
      "description": null,
      "package": 1077628,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:35:42+00:00",
      "updated_at": "2021-03-09T02:35:42+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "68d1d2d76013916fb25a3a72ded3ef55385560fd04c02822a2d59bad5deee2b0",
      "sha1": "fab6ac8c8e9c8dbbe5ba9787db1d80c308c621bc",
      "md5": "fd3e7cf1c0820a2a2d69dcb184446201",
      "name": "cpupower",
      "size": 64032,
      "description": null,
      "package": 1077628,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:35:42+00:00",
      "updated_at": "2021-03-09T02:35:42+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2020-12351",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d",
        "name": "liblockdep-dev",
        "version": "4.19.152-1",
        "filename": "liblockdep-dev_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:31:39+00:00",
      "updated_at": "2021-03-09T07:31:39+00:00"
    },
    {
      "name": "CVE-2020-12352",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d",
        "name": "liblockdep-dev",
        "version": "4.19.152-1",
        "filename": "liblockdep-dev_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:31:50+00:00",
      "updated_at": "2021-03-09T07:31:50+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d",
        "name": "liblockdep-dev",
        "version": "4.19.152-1",
        "filename": "liblockdep-dev_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:32:00+00:00",
      "updated_at": "2021-03-09T07:32:00+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d",
        "name": "liblockdep-dev",
        "version": "4.19.152-1",
        "filename": "liblockdep-dev_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:32:08+00:00",
      "updated_at": "2021-03-09T07:32:08+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d",
        "name": "liblockdep-dev",
        "version": "4.19.152-1",
        "filename": "liblockdep-dev_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-09T07:32:17+00:00",
      "updated_at": "2021-03-09T07:32:17+00:00"
    },
    {
      "name": "CVE-2020-12351",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-21T07:40:16+00:00",
      "updated_at": "2021-03-21T07:40:16+00:00"
    },
    {
      "name": "CVE-2020-12352",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-21T07:40:18+00:00",
      "updated_at": "2021-03-21T07:40:18+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-21T07:40:20+00:00",
      "updated_at": "2021-03-21T07:40:20+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-21T07:40:22+00:00",
      "updated_at": "2021-03-21T07:40:22+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5",
        "name": "linux-cpupower",
        "version": "4.19.152-1",
        "filename": "linux-cpupower_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-21T07:40:24+00:00",
      "updated_at": "2021-03-21T07:40:24+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-09-18T21:23:26+00:00",
  "updated_at": "2021-03-09T02:35:42+00:00",
  "deleted_at": null
}