f0313c68b6cf7ca1c5dd840148de3db0034fc5709bd4b04d2bca4a47d3ae7a89
b54c156961c47056ae395704a8fe70cab6b63038
554537c3dead9ee3fc53840b0f8f644d
5.10.120-1~bpo10+1
libcpupower1_5.10.120-1~bpo10+1_i386.deb
502
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.4)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.1 /usr/lib/i386-linux-gnu/libcpupower.so.0.0.1 | 21980 | 0 | ||
libcpupower.so.1 /usr/lib/i386-linux-gnu/libcpupower.so.1 | 21980 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-0494 | 0 | DSA DSA-5161-1 | |
CVE-2022-0854 | 55 | DSA DSA-5161-1 | |
CVE-2022-1012 | 91 | DSA DSA-5161-1 | |
CVE-2022-1729 | 70 | DSA DSA-5161-1 | |
CVE-2022-1786 | 0 | DSA DSA-5161-1 | |
CVE-2022-1789 | 0 | DSA DSA-5161-1 | |
CVE-2022-1852 | 0 | DSA DSA-5161-1 | |
CVE-2022-32250 | 0 | DSA DSA-5161-1 | |
CVE-2022-1972 | 0 | DSA DSA-5161-1 | |
CVE-2022-1974 | 41 | DSA DSA-5161-1 | |
CVE-2022-1975 | 55 | DSA DSA-5161-1 | |
CVE-2022-21499 | 67 | DSA DSA-5161-1 | |
CVE-2022-28893 | 78 | DSA DSA-5161-1 | |
CVE-2022-2078 | 0 | DSA DSA-5161-1 |
{ "sha256": "f0313c68b6cf7ca1c5dd840148de3db0034fc5709bd4b04d2bca4a47d3ae7a89", "sha1": "b54c156961c47056ae395704a8fe70cab6b63038", "md5": "554537c3dead9ee3fc53840b0f8f644d", "type": "DEB", "arch": "I386", "name": "libcpupower1", "filename": "libcpupower1_5.10.120-1~bpo10+1_i386.deb", "size": 502, "description": "CPU frequency and voltage scaling tools for Linux (libraries)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package contains the shared library.", "url": "https://www.kernel.org/", "version": "5.10.120-1~bpo10+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.4)", "applications": [ { "path": "/usr/lib/i386-linux-gnu/libcpupower.so.0.0.1", "sha256": "3559b7d3b2273c5b328aaf7f8d81090ac18d18027a964a535d08f000fbc1b5ac", "sha1": "c214af96dbd39b09c9e28d8ba0bb3cf07f43abcc", "md5": "c00edbcb171e7d4eae370cb423d8b6fb", "name": "libcpupower.so.1", "size": 21980, "description": null, "package": 3794664, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-21T02:43:00+00:00", "updated_at": "2022-06-21T02:43:00+00:00", "deleted_at": null }, { "path": "/usr/lib/i386-linux-gnu/libcpupower.so.1", "sha256": "3559b7d3b2273c5b328aaf7f8d81090ac18d18027a964a535d08f000fbc1b5ac", "sha1": "c214af96dbd39b09c9e28d8ba0bb3cf07f43abcc", "md5": "c00edbcb171e7d4eae370cb423d8b6fb", "name": "libcpupower.so.1", "size": 21980, "description": null, "package": 3794664, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-21T02:43:00+00:00", "updated_at": "2022-06-21T02:43:00+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-0494", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:44:17+00:00", "updated_at": "2022-07-27T20:44:17+00:00" }, { "name": "CVE-2022-0854", "risk": 55, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:44:50+00:00", "updated_at": "2022-07-27T20:44:50+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:45:21+00:00", "updated_at": "2022-07-27T20:45:21+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:45:54+00:00", "updated_at": "2022-07-27T20:45:54+00:00" }, { "name": "CVE-2022-1786", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:46:27+00:00", "updated_at": "2022-07-27T20:46:27+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:47:01+00:00", "updated_at": "2022-07-27T20:47:01+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:47:34+00:00", "updated_at": "2022-07-27T20:47:34+00:00" }, { "name": "CVE-2022-32250", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:48:13+00:00", "updated_at": "2022-07-27T20:48:13+00:00" }, { "name": "CVE-2022-1972", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:48:45+00:00", "updated_at": "2022-07-27T20:48:45+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:49:22+00:00", "updated_at": "2022-07-27T20:49:22+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:49:57+00:00", "updated_at": "2022-07-27T20:49:57+00:00" }, { "name": "CVE-2022-21499", "risk": 67, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:50:29+00:00", "updated_at": "2022-07-27T20:50:29+00:00" }, { "name": "CVE-2022-28893", "risk": 78, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:51:00+00:00", "updated_at": "2022-07-27T20:51:00+00:00" }, { "name": "CVE-2022-2078", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-09-18T15:51:19+00:00", "updated_at": "2022-09-18T15:51:19+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-06-20T18:15:52+00:00", "updated_at": "2022-06-21T01:43:00+00:00", "deleted_at": null }