bd76824964eafdae1dc7c848045dfc5029e90c9ba02e60d7d306420ac6fa25f3
9d8d8ea06e3d8804444c10ce4b9de16c2d9bca39
80a9386dd624cedf2833b95d6b9da466
4.19.146-1
linux-cpupower_4.19.146-1_amd64.deb
769
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
x86_energy_perf_policy /usr/sbin/x86_energy_perf_policy | 31648 | 0 | ||
turbostat /usr/sbin/turbostat | 115696 | 0 | ||
cpupower /usr/bin/cpupower | 64032 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-12351 | 88 | DSA DSA-4774-1 | liblockdep-dev 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | liblockdep-dev 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | liblockdep-dev 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | liblockdep-dev 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | liblockdep-dev 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | linux-cpupower 4.19.152-1 |
{ "sha256": "bd76824964eafdae1dc7c848045dfc5029e90c9ba02e60d7d306420ac6fa25f3", "sha1": "9d8d8ea06e3d8804444c10ce4b9de16c2d9bca39", "md5": "80a9386dd624cedf2833b95d6b9da466", "type": "DEB", "arch": "AMD64", "name": "linux-cpupower", "filename": "linux-cpupower_4.19.146-1_amd64.deb", "size": 769, "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that support these features. It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.", "url": "https://www.kernel.org/", "version": "4.19.146-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7), libcpupower1 (>= 4.7~rc2-1~exp1), libpci3 (>= 1:3.5.2-1)", "applications": [ { "path": "/usr/sbin/x86_energy_perf_policy", "sha256": "e5c4d99303397e9236366230df51b76218f51c6c8bd829df9833ae8f232c95bc", "sha1": "dec99e4c025c6b19ab66da194c90d5fb0c96f4d0", "md5": "68c1ed97671280b9ca2beb512d9433ad", "name": "x86_energy_perf_policy", "size": 31648, "description": null, "package": 1077628, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:35:42+00:00", "updated_at": "2021-03-09T02:35:42+00:00", "deleted_at": null }, { "path": "/usr/sbin/turbostat", "sha256": "fc26b74961c833a6a88891d3bd7b6008cb5b6584efda43ba2cd566e6ada9d9b3", "sha1": "aad46d899c1948ce1af7f6d1e0fde188114e9989", "md5": "a98494fb7815ac9337328e66bad8503f", "name": "turbostat", "size": 115696, "description": null, "package": 1077628, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:35:42+00:00", "updated_at": "2021-03-09T02:35:42+00:00", "deleted_at": null }, { "path": "/usr/bin/cpupower", "sha256": "68d1d2d76013916fb25a3a72ded3ef55385560fd04c02822a2d59bad5deee2b0", "sha1": "fab6ac8c8e9c8dbbe5ba9787db1d80c308c621bc", "md5": "fd3e7cf1c0820a2a2d69dcb184446201", "name": "cpupower", "size": 64032, "description": null, "package": 1077628, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T02:35:42+00:00", "updated_at": "2021-03-09T02:35:42+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d", "name": "liblockdep-dev", "version": "4.19.152-1", "filename": "liblockdep-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:39+00:00", "updated_at": "2021-03-09T07:31:39+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d", "name": "liblockdep-dev", "version": "4.19.152-1", "filename": "liblockdep-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:50+00:00", "updated_at": "2021-03-09T07:31:50+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d", "name": "liblockdep-dev", "version": "4.19.152-1", "filename": "liblockdep-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:00+00:00", "updated_at": "2021-03-09T07:32:00+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d", "name": "liblockdep-dev", "version": "4.19.152-1", "filename": "liblockdep-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:08+00:00", "updated_at": "2021-03-09T07:32:08+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f502d0afa3b9a0fdada99cf2cfe18581d72975d45e901531de52673bd0f3816d", "name": "liblockdep-dev", "version": "4.19.152-1", "filename": "liblockdep-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:17+00:00", "updated_at": "2021-03-09T07:32:17+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:16+00:00", "updated_at": "2021-03-21T07:40:16+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:18+00:00", "updated_at": "2021-03-21T07:40:18+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:20+00:00", "updated_at": "2021-03-21T07:40:20+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:22+00:00", "updated_at": "2021-03-21T07:40:22+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "b5e7762cbc952a48c5ba1d9a1453198bc100e290e0f1c8adabeae6ddeddd43f5", "name": "linux-cpupower", "version": "4.19.152-1", "filename": "linux-cpupower_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:24+00:00", "updated_at": "2021-03-21T07:40:24+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2020-09-18T21:23:26+00:00", "updated_at": "2021-03-09T02:35:42+00:00", "deleted_at": null }