0f125ded7b9683e5777b9e481c28147d6d1d65d012ba109c8721770eeff5df63
48408cf43fa6a33f80c8882ea659bad64c0b0665
5188e2a4f780acedd2e3bc9133d864a3
4.19.67-2+deb10u1~bpo9+1
linux-headers-4.19.0-0.bpo.6-686_4.19.67-2+deb10u1~bpo9+1_i386.deb
4711
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-4.19.0-0.bpo.6-common (= 4.19.67-2+deb10u1~bpo9+1), linux-kbuild-4.19 (>= 4.19.67-2+deb10u1~bpo9+1), linux-compiler-gcc-6-x86 (>= 4.14.17-1~)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-14821 | 88 | DSA DSA-4531-1 | hyperv-daemons 4.19.67-2+deb10u1 |
CVE-2019-14835 | 78 | DSA DSA-4531-1 | hyperv-daemons 4.19.67-2+deb10u1 |
CVE-2019-15117 | 78 | DSA DSA-4531-1 | hyperv-daemons 4.19.67-2+deb10u1 |
CVE-2019-15118 | 55 | DSA DSA-4531-1 | hyperv-daemons 4.19.67-2+deb10u1 |
CVE-2019-15902 | 56 | DSA DSA-4531-1 | hyperv-daemons 4.19.67-2+deb10u1 |
{ "sha256": "0f125ded7b9683e5777b9e481c28147d6d1d65d012ba109c8721770eeff5df63", "sha1": "48408cf43fa6a33f80c8882ea659bad64c0b0665", "md5": "5188e2a4f780acedd2e3bc9133d864a3", "type": "DEB", "arch": "I386", "name": "linux-headers-4.19.0-0.bpo.6-686", "filename": "linux-headers-4.19.0-0.bpo.6-686_4.19.67-2+deb10u1~bpo9+1_i386.deb", "size": 4711, "description": "Header files for Linux 4.19.0-0.bpo.6-686\nThis package provides the architecture-specific kernel header files for\nLinux kernel 4.19.0-0.bpo.6-686, generally used for building out-of-tree\nkernel modules. These files are going to be installed into\n/usr/src/linux-headers-4.19.0-0.bpo.6-686, and can be used for building\nmodules that load into the kernel provided by the\nlinux-image-4.19.0-0.bpo.6-686 package.", "url": "https://www.kernel.org/", "version": "4.19.67-2+deb10u1~bpo9+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-4.19.0-0.bpo.6-common (= 4.19.67-2+deb10u1~bpo9+1), linux-kbuild-4.19 (>= 4.19.67-2+deb10u1~bpo9+1), linux-compiler-gcc-6-x86 (>= 4.14.17-1~)", "applications": [], "vulnerabilities": [ { "name": "CVE-2019-14821", "risk": 88, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "52884a76f47ece1b00013808fddf42860f46e99ff782e9bf30475b0256aabc57", "name": "hyperv-daemons", "version": "4.19.67-2+deb10u1", "filename": "hyperv-daemons_4.19.67-2+deb10u1_amd64.deb" }, "created_at": "2021-03-08T10:01:46+00:00", "updated_at": "2021-03-08T10:01:46+00:00" }, { "name": "CVE-2019-14835", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "52884a76f47ece1b00013808fddf42860f46e99ff782e9bf30475b0256aabc57", "name": "hyperv-daemons", "version": "4.19.67-2+deb10u1", "filename": "hyperv-daemons_4.19.67-2+deb10u1_amd64.deb" }, "created_at": "2021-03-08T10:01:47+00:00", "updated_at": "2021-03-08T10:01:47+00:00" }, { "name": "CVE-2019-15117", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "52884a76f47ece1b00013808fddf42860f46e99ff782e9bf30475b0256aabc57", "name": "hyperv-daemons", "version": "4.19.67-2+deb10u1", "filename": "hyperv-daemons_4.19.67-2+deb10u1_amd64.deb" }, "created_at": "2021-03-08T10:01:48+00:00", "updated_at": "2021-03-08T10:01:48+00:00" }, { "name": "CVE-2019-15118", "risk": 55, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "52884a76f47ece1b00013808fddf42860f46e99ff782e9bf30475b0256aabc57", "name": "hyperv-daemons", "version": "4.19.67-2+deb10u1", "filename": "hyperv-daemons_4.19.67-2+deb10u1_amd64.deb" }, "created_at": "2021-03-08T10:01:48+00:00", "updated_at": "2021-03-08T10:01:48+00:00" }, { "name": "CVE-2019-15902", "risk": 56, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "52884a76f47ece1b00013808fddf42860f46e99ff782e9bf30475b0256aabc57", "name": "hyperv-daemons", "version": "4.19.67-2+deb10u1", "filename": "hyperv-daemons_4.19.67-2+deb10u1_amd64.deb" }, "created_at": "2021-03-08T10:01:49+00:00", "updated_at": "2021-03-08T10:01:49+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2019-10-02T04:27:58+00:00", "updated_at": "2021-03-07T08:04:20+00:00", "deleted_at": null }