Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (13)

linux-image-4.4.0-1056-kvm

Hashes
Linux kernel image for version 4.4.0 on 64 bit x86 SMP This package contains the Linux kernel image for version 4.4.0 on 64 bit x86 SMP. Supports amd64 processors. Geared toward virtual systems. You likely do not want to install this package directly. Instead, install the linux-kvm meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 109c83fa29e1e77f53809a5837a6aa88dbee21e6e55d5833dbdf77e2eea05dba
  • SHA1: 2b9e617bfa9d1041490f19e12fbbe3910c3c5763
  • MD5: 6130a595fd058bd23880a426d4df547a
Information
  • Version: 4.4.0-1056.63
  • Filename: linux-image-4.4.0-1056-kvm_4.4.0-1056.63_amd64.deb
  • Size: 3858
  • Type: DEB
  • Source: linux-kvm
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.4.0-1056-kvm

Vulnerabilities

NameRiskSourceFixed
CVE-2018-2097678USN
USN-4145-1
CVE-2019-1592694USN
USN-4147-1
CVE-2019-1020755USN
USN-4147-1
CVE-2019-1148778USN
USN-4145-1
CVE-2019-2093454USN
CVE-2019-1363168USN
USN-4147-1
CVE-2019-1521149USN
USN-4147-1
CVE-2019-013674USN
USN-4147-1
CVE-2019-1521549USN
USN-4147-1
CVE-2019-1483578USN
USN-4135-2
CVE-2019-1523978USN
CVE-2016-1090578USN
USN-4145-1
CVE-2017-1850978USN
USN-4145-1

Raw Object

{
  "sha256": "109c83fa29e1e77f53809a5837a6aa88dbee21e6e55d5833dbdf77e2eea05dba",
  "sha1": "2b9e617bfa9d1041490f19e12fbbe3910c3c5763",
  "md5": "6130a595fd058bd23880a426d4df547a",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-4.4.0-1056-kvm",
  "filename": "linux-image-4.4.0-1056-kvm_4.4.0-1056.63_amd64.deb",
  "size": 3858,
  "description": "Linux kernel image for version 4.4.0 on 64 bit x86 SMP\nThis package contains the Linux kernel image for version 4.4.0 on\n64 bit x86 SMP.\n\nSupports amd64 processors.\n\nGeared toward virtual systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-kvm meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "4.4.0-1056.63",
  "source": "linux-kvm",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.4.0-1056-kvm",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2018-20976",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4145-1",
      "fixed": null,
      "created_at": "2021-03-22T04:38:33+00:00",
      "updated_at": "2021-03-22T04:38:33+00:00"
    },
    {
      "name": "CVE-2019-15926",
      "risk": 94,
      "source": "USN",
      "sid": "USN-4147-1",
      "fixed": null,
      "created_at": "2021-03-22T04:43:57+00:00",
      "updated_at": "2021-03-22T04:43:57+00:00"
    },
    {
      "name": "CVE-2019-10207",
      "risk": 55,
      "source": "USN",
      "sid": "USN-4147-1",
      "fixed": null,
      "created_at": "2021-03-22T04:50:24+00:00",
      "updated_at": "2021-03-22T04:50:24+00:00"
    },
    {
      "name": "CVE-2019-11487",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4145-1",
      "fixed": null,
      "created_at": "2021-03-22T05:08:01+00:00",
      "updated_at": "2021-03-22T05:08:01+00:00"
    },
    {
      "name": "CVE-2019-20934",
      "risk": 54,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-22T05:17:07+00:00",
      "updated_at": "2021-03-22T05:17:07+00:00"
    },
    {
      "name": "CVE-2019-13631",
      "risk": 68,
      "source": "USN",
      "sid": "USN-4147-1",
      "fixed": null,
      "created_at": "2021-03-22T05:33:30+00:00",
      "updated_at": "2021-03-22T05:33:30+00:00"
    },
    {
      "name": "CVE-2019-15211",
      "risk": 49,
      "source": "USN",
      "sid": "USN-4147-1",
      "fixed": null,
      "created_at": "2021-03-22T05:33:40+00:00",
      "updated_at": "2021-03-22T05:33:40+00:00"
    },
    {
      "name": "CVE-2019-0136",
      "risk": 74,
      "source": "USN",
      "sid": "USN-4147-1",
      "fixed": null,
      "created_at": "2021-03-22T05:38:23+00:00",
      "updated_at": "2021-03-22T05:38:23+00:00"
    },
    {
      "name": "CVE-2019-15215",
      "risk": 49,
      "source": "USN",
      "sid": "USN-4147-1",
      "fixed": null,
      "created_at": "2021-03-22T05:38:39+00:00",
      "updated_at": "2021-03-22T05:38:39+00:00"
    },
    {
      "name": "CVE-2019-14835",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4135-2",
      "fixed": null,
      "created_at": "2021-03-22T05:44:42+00:00",
      "updated_at": "2021-03-22T05:44:42+00:00"
    },
    {
      "name": "CVE-2019-15239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2021-03-22T05:47:22+00:00",
      "updated_at": "2021-03-22T05:47:22+00:00"
    },
    {
      "name": "CVE-2016-10905",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4145-1",
      "fixed": null,
      "created_at": "2021-03-22T13:31:49+00:00",
      "updated_at": "2021-03-22T13:31:49+00:00"
    },
    {
      "name": "CVE-2017-18509",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4145-1",
      "fixed": null,
      "created_at": "2021-03-22T13:36:07+00:00",
      "updated_at": "2021-03-22T13:36:07+00:00"
    }
  ],
  "risk": 94,
  "vulnerable": 94,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-08-27T12:57:10+00:00",
  "updated_at": "2021-03-19T09:23:15+00:00",
  "deleted_at": null
}