d506dc4d4dced5fbd160403e55e8bce345d1217c55cce81e1beddcfd1c0af546
9045ff94986a13a211b22290bd6630beb4986b6b
c8d09693a21035428e09c4d9f34e2440
4.19.37-5+deb10u2~bpo9+1
libcpupower-dev_4.19.37-5+deb10u2~bpo9+1_i386.deb
286
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libcpupower1 (= 4.19.37-5+deb10u2~bpo9+1)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2018-20836 | 93 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-1125 | 55 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-1999 | 78 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-10207 | 55 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-10638 | 65 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-12817 | 70 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-12984 | 55 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-13233 | 70 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-13631 | 68 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-13648 | 55 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-14283 | 68 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2019-14284 | 62 | DSA DSA-4495-1 | hyperv-daemons 4.19.37-5+deb10u2 |
CVE-2018-20836 | 93 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-1125 | 55 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-1999 | 78 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-10207 | 55 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-10638 | 65 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-12817 | 70 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-12984 | 55 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-13233 | 70 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-13631 | 68 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-13648 | 55 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-14283 | 68 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
CVE-2019-14284 | 62 | DSA DSA-4495-1 | libcpupower-dev 4.19.37-5+deb10u2 |
{ "sha256": "d506dc4d4dced5fbd160403e55e8bce345d1217c55cce81e1beddcfd1c0af546", "sha1": "9045ff94986a13a211b22290bd6630beb4986b6b", "md5": "c8d09693a21035428e09c4d9f34e2440", "type": "DEB", "arch": "I386", "name": "libcpupower-dev", "filename": "libcpupower-dev_4.19.37-5+deb10u2~bpo9+1_i386.deb", "size": 286, "description": "CPU frequency and voltage scaling tools for Linux (development files)\nThis package contains the 'power/cpupower' headers and library shared\nobjects.", "url": "https://www.kernel.org/", "version": "4.19.37-5+deb10u2~bpo9+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libcpupower1 (= 4.19.37-5+deb10u2~bpo9+1)", "applications": [], "vulnerabilities": [ { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:10+00:00", "updated_at": "2021-03-08T10:03:10+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:11+00:00", "updated_at": "2021-03-08T10:03:11+00:00" }, { "name": "CVE-2019-1999", "risk": 78, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:12+00:00", "updated_at": "2021-03-08T10:03:12+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:13+00:00", "updated_at": "2021-03-08T10:03:13+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:14+00:00", "updated_at": "2021-03-08T10:03:14+00:00" }, { "name": "CVE-2019-12817", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:15+00:00", "updated_at": "2021-03-08T10:03:15+00:00" }, { "name": "CVE-2019-12984", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:16+00:00", "updated_at": "2021-03-08T10:03:16+00:00" }, { "name": "CVE-2019-13233", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:18+00:00", "updated_at": "2021-03-08T10:03:18+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:19+00:00", "updated_at": "2021-03-08T10:03:19+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:20+00:00", "updated_at": "2021-03-08T10:03:20+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:21+00:00", "updated_at": "2021-03-08T10:03:21+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "94618815569f892e509d908abd0e30c9bac9d27fcbc3532cd8c1d1dd03c717af", "name": "hyperv-daemons", "version": "4.19.37-5+deb10u2", "filename": "hyperv-daemons_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-08T10:03:22+00:00", "updated_at": "2021-03-08T10:03:22+00:00" }, { "name": "CVE-2018-20836", "risk": 93, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:54:55+00:00", "updated_at": "2021-03-21T19:54:55+00:00" }, { "name": "CVE-2019-1125", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:54:59+00:00", "updated_at": "2021-03-21T19:54:59+00:00" }, { "name": "CVE-2019-1999", "risk": 78, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:03+00:00", "updated_at": "2021-03-21T19:55:03+00:00" }, { "name": "CVE-2019-10207", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:06+00:00", "updated_at": "2021-03-21T19:55:06+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:10+00:00", "updated_at": "2021-03-21T19:55:10+00:00" }, { "name": "CVE-2019-12817", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:13+00:00", "updated_at": "2021-03-21T19:55:13+00:00" }, { "name": "CVE-2019-12984", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:17+00:00", "updated_at": "2021-03-21T19:55:17+00:00" }, { "name": "CVE-2019-13233", "risk": 70, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:20+00:00", "updated_at": "2021-03-21T19:55:20+00:00" }, { "name": "CVE-2019-13631", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:24+00:00", "updated_at": "2021-03-21T19:55:24+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:27+00:00", "updated_at": "2021-03-21T19:55:27+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:31+00:00", "updated_at": "2021-03-21T19:55:31+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "DSA", "sid": "DSA-4495-1", "fixed": { "sha256": "1589f901be6d8cb3d100b60682060b7c7af800b0216aacacd146857365ee148f", "name": "libcpupower-dev", "version": "4.19.37-5+deb10u2", "filename": "libcpupower-dev_4.19.37-5+deb10u2_i386.deb" }, "created_at": "2021-03-21T19:55:35+00:00", "updated_at": "2021-03-21T19:55:35+00:00" } ], "risk": 93, "vulnerable": 93, "outdated": 0, "malicious": 0, "created_at": "2019-08-22T08:15:30+00:00", "updated_at": "2021-03-07T06:31:17+00:00", "deleted_at": null }