Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (14)

linux-cpupower

Hashes
CPU power management tools for Linux The cpupower command allows inspection and control of cpufreq and cpuidle tunables for hardware that supports these features. It replaces "cpufreq-info" and "cpufreq-set" in cpufrequtils. The turbostat command reports topology, frequency, idle power-state statistics, temperature and power consumption information as provided by the CPU. The x86_energy_perf_policy command sets a general policy on some Intel CPU models for the relative importance of performance versus energy savings.
  • SHA256: f373cba8144f85f53351a0c37b3ad139a035c0a185e3de96642c81937f803ae2
  • SHA1: a745c0ef2e83da21e9c7cddfa66825ba1fb9e209
  • MD5: 3476580fafc6545c71d92cc01d56ed5d
Information
  • Version: 5.10.120-1~bpo10+1
  • Filename: linux-cpupower_5.10.120-1~bpo10+1_amd64.deb
  • Size: 790
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.7), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.2-1)

Applications

NameTypeArchSizeRisk
turbostat
/usr/sbin/turbostat
1242720
x86_energy_perf_policy
/usr/sbin/x86_energy_perf_policy
316800
cpupower
/usr/bin/cpupower
640320

Vulnerabilities

NameRiskSourceFixed
CVE-2022-04940DSA
DSA-5161-1
CVE-2022-085455DSA
DSA-5161-1
CVE-2022-101291DSA
DSA-5161-1
CVE-2022-172970DSA
DSA-5161-1
CVE-2022-17860DSA
DSA-5161-1
CVE-2022-17890DSA
DSA-5161-1
CVE-2022-18520DSA
DSA-5161-1
CVE-2022-322500DSA
DSA-5161-1
CVE-2022-19720DSA
DSA-5161-1
CVE-2022-197441DSA
DSA-5161-1
CVE-2022-197555DSA
DSA-5161-1
CVE-2022-2149967DSA
DSA-5161-1
CVE-2022-2889378DSA
DSA-5161-1
CVE-2022-20780DSA
DSA-5161-1

Raw Object

{
  "sha256": "f373cba8144f85f53351a0c37b3ad139a035c0a185e3de96642c81937f803ae2",
  "sha1": "a745c0ef2e83da21e9c7cddfa66825ba1fb9e209",
  "md5": "3476580fafc6545c71d92cc01d56ed5d",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-cpupower",
  "filename": "linux-cpupower_5.10.120-1~bpo10+1_amd64.deb",
  "size": 790,
  "description": "CPU power management tools for Linux\nThe cpupower command allows inspection and control of cpufreq and cpuidle\ntunables for hardware that supports these features.  It replaces\n\"cpufreq-info\" and \"cpufreq-set\" in cpufrequtils.\n\nThe turbostat command reports topology, frequency, idle power-state\nstatistics, temperature and power consumption information as provided\nby the CPU.\n\nThe x86_energy_perf_policy command sets a general policy on some Intel\nCPU models for the relative importance of performance versus energy\nsavings.",
  "url": "https://www.kernel.org/",
  "version": "5.10.120-1~bpo10+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.7), libcap2 (>= 1:2.10), libcpupower1 (>= 5.5.8-1~exp1), libpci3 (>= 1:3.5.2-1)",
  "applications": [
    {
      "path": "/usr/sbin/turbostat",
      "sha256": "aed0bf59ed759b38f323a57df2789d180733e67d289d2e367455fcbf45a79c3a",
      "sha1": "be18a0d6c701b4130688ca71fcb1644855a7c771",
      "md5": "d9ec165c6bd36be13e8d380dd29ff419",
      "name": "turbostat",
      "size": 124272,
      "description": null,
      "package": 3794643,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:27:36+00:00",
      "updated_at": "2022-06-21T02:27:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/x86_energy_perf_policy",
      "sha256": "4483a69fa57146638096345e61b6a6f6d6773fe7b442ba133f9c2b07124c945e",
      "sha1": "7a209134ec41b414d6ef6b9e2be600c1e33d0013",
      "md5": "6788ec2792c71c7e6ba955bb97911a5e",
      "name": "x86_energy_perf_policy",
      "size": 31680,
      "description": null,
      "package": 3794643,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:27:36+00:00",
      "updated_at": "2022-06-21T02:27:36+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/bin/cpupower",
      "sha256": "2def46a98d8895a7fd71a384075229fdb74de6494e466b134ce49cfc4448bd32",
      "sha1": "34bfb3bfef17a9dd38bdd438c52bec563928a1cc",
      "md5": "8da74b9fdc31dbdfa03cc281588d87ce",
      "name": "cpupower",
      "size": 64032,
      "description": null,
      "package": 3794643,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:27:36+00:00",
      "updated_at": "2022-06-21T02:27:36+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:05+00:00",
      "updated_at": "2022-07-27T20:44:05+00:00"
    },
    {
      "name": "CVE-2022-0854",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:36+00:00",
      "updated_at": "2022-07-27T20:44:36+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:09+00:00",
      "updated_at": "2022-07-27T20:45:09+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:40+00:00",
      "updated_at": "2022-07-27T20:45:40+00:00"
    },
    {
      "name": "CVE-2022-1786",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:14+00:00",
      "updated_at": "2022-07-27T20:46:14+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:47+00:00",
      "updated_at": "2022-07-27T20:46:47+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:21+00:00",
      "updated_at": "2022-07-27T20:47:21+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:58+00:00",
      "updated_at": "2022-07-27T20:47:58+00:00"
    },
    {
      "name": "CVE-2022-1972",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:32+00:00",
      "updated_at": "2022-07-27T20:48:32+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:06+00:00",
      "updated_at": "2022-07-27T20:49:06+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:43+00:00",
      "updated_at": "2022-07-27T20:49:43+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:17+00:00",
      "updated_at": "2022-07-27T20:50:17+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:48+00:00",
      "updated_at": "2022-07-27T20:50:48+00:00"
    },
    {
      "name": "CVE-2022-2078",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-09-18T15:51:05+00:00",
      "updated_at": "2022-09-18T15:51:05+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-20T19:47:19+00:00",
  "updated_at": "2022-06-21T01:27:36+00:00",
  "deleted_at": null
}