f100c88a1de43bde05eb842cb941f5bf340aab71aa18c4e6c9a5b0675b890bb4
5121280225035880e2de962fc0bba391610a5455
f93a0e16de45ec196cb6329e9350bddc
4.19.146-1
libcpupower1-dbgsym_4.19.146-1_i386.deb
34
DEB
linux
I386
Debian Kernel Team <debian-kernel@lists.debian.org>
libcpupower1 (= 4.19.146-1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
f6d117c6f0e72e24d9e773d4c8c2d32bdf5465.debug /usr/lib/debug/.build-id/fe/f6d117c6f0e72e24d9e773d4c8c2d32bdf5465.debug | 23980 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-12351 | 88 | DSA DSA-4774-1 | liblockdep4.19 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | liblockdep4.19 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | liblockdep4.19 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | liblockdep4.19 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | liblockdep4.19 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | libcpupower1-dbgsym 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | libcpupower1-dbgsym 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | libcpupower1-dbgsym 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | libcpupower1-dbgsym 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | libcpupower1-dbgsym 4.19.152-1 |
{ "sha256": "f100c88a1de43bde05eb842cb941f5bf340aab71aa18c4e6c9a5b0675b890bb4", "sha1": "5121280225035880e2de962fc0bba391610a5455", "md5": "f93a0e16de45ec196cb6329e9350bddc", "type": "DEB", "arch": "I386", "name": "libcpupower1-dbgsym", "filename": "libcpupower1-dbgsym_4.19.146-1_i386.deb", "size": 34, "description": "debug symbols for libcpupower1", "url": null, "version": "4.19.146-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libcpupower1 (= 4.19.146-1)", "applications": [ { "path": "/usr/lib/debug/.build-id/fe/f6d117c6f0e72e24d9e773d4c8c2d32bdf5465.debug", "sha256": "b87e53e68e625d3790b1066facf6be1aa771ab4c8e88fd8bcd0cb05fcc305ffd", "sha1": "2f6006f4dcf30968456cfccab19c57c33d381039", "md5": "4b26ae7ca07baec9fc2ccef8eaede981", "name": "f6d117c6f0e72e24d9e773d4c8c2d32bdf5465.debug", "size": 23980, "description": null, "package": 1068132, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-09T01:26:49+00:00", "updated_at": "2021-03-09T01:26:49+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "c04ddc7accb768812b410bff01c296b0e7c5322ff23400d314ade3f15a0bdf39", "name": "liblockdep4.19", "version": "4.19.152-1", "filename": "liblockdep4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-09T07:31:37+00:00", "updated_at": "2021-03-09T07:31:37+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "c04ddc7accb768812b410bff01c296b0e7c5322ff23400d314ade3f15a0bdf39", "name": "liblockdep4.19", "version": "4.19.152-1", "filename": "liblockdep4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-09T07:31:48+00:00", "updated_at": "2021-03-09T07:31:48+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "c04ddc7accb768812b410bff01c296b0e7c5322ff23400d314ade3f15a0bdf39", "name": "liblockdep4.19", "version": "4.19.152-1", "filename": "liblockdep4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-09T07:31:58+00:00", "updated_at": "2021-03-09T07:31:58+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "c04ddc7accb768812b410bff01c296b0e7c5322ff23400d314ade3f15a0bdf39", "name": "liblockdep4.19", "version": "4.19.152-1", "filename": "liblockdep4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-09T07:32:07+00:00", "updated_at": "2021-03-09T07:32:07+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "c04ddc7accb768812b410bff01c296b0e7c5322ff23400d314ade3f15a0bdf39", "name": "liblockdep4.19", "version": "4.19.152-1", "filename": "liblockdep4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-09T07:32:16+00:00", "updated_at": "2021-03-09T07:32:16+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "3746b6603f672b155a7960c99aae4ef6dd6fc366db9c49bd36cb1077eb1eb918", "name": "libcpupower1-dbgsym", "version": "4.19.152-1", "filename": "libcpupower1-dbgsym_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:15+00:00", "updated_at": "2021-03-21T07:40:15+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "3746b6603f672b155a7960c99aae4ef6dd6fc366db9c49bd36cb1077eb1eb918", "name": "libcpupower1-dbgsym", "version": "4.19.152-1", "filename": "libcpupower1-dbgsym_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:18+00:00", "updated_at": "2021-03-21T07:40:18+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "3746b6603f672b155a7960c99aae4ef6dd6fc366db9c49bd36cb1077eb1eb918", "name": "libcpupower1-dbgsym", "version": "4.19.152-1", "filename": "libcpupower1-dbgsym_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:20+00:00", "updated_at": "2021-03-21T07:40:20+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "3746b6603f672b155a7960c99aae4ef6dd6fc366db9c49bd36cb1077eb1eb918", "name": "libcpupower1-dbgsym", "version": "4.19.152-1", "filename": "libcpupower1-dbgsym_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:22+00:00", "updated_at": "2021-03-21T07:40:22+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "3746b6603f672b155a7960c99aae4ef6dd6fc366db9c49bd36cb1077eb1eb918", "name": "libcpupower1-dbgsym", "version": "4.19.152-1", "filename": "libcpupower1-dbgsym_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:23+00:00", "updated_at": "2021-03-21T07:40:23+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2020-09-18T21:00:59+00:00", "updated_at": "2021-03-09T01:26:49+00:00", "deleted_at": null }