Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (28)

linux-image-5.0.0-32-lowlatency

Hashes
Linux kernel image for version 5.0.0 on 32 bit x86 SMP This package contains the Linux kernel image for version 5.0.0 on 32 bit x86 SMP. Supports Lowlatency processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-lowlatency meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 1a9bf36ce7d6f97ea413fdc9e1e62cdeabe6b64b903fc64e6d8ef2b92dbea0e5
  • SHA1: badbd9609909b2bc86ce6c887b9baf73fc82278f
  • MD5: 3da8b6f08fb468fc4533071fa9103234
Information
  • Version: 5.0.0-32.34
  • Filename: linux-image-5.0.0-32-lowlatency_5.0.0-32.34_i386.deb
  • Size: 8051
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-32-lowlatency

Vulnerabilities

NameRiskSourceFixed
CVE-2018-1220765USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1705233USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1705433USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1908071USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1705633USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1953324USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1705533USN
linux-libc-dev
5.0.0-35.38
CVE-2019-015455USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1705333USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1908171USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1113565USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1766688USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1880655USN
linux-libc-dev
5.0.0-35.38
CVE-2019-1509849USN
linux-libc-dev
5.0.0-35.38
CVE-2018-1220765USN
linux-doc
5.0.0-35.38
CVE-2019-1908071USN
linux-doc
5.0.0-35.38
CVE-2019-1705333USN
linux-doc
5.0.0-35.38
CVE-2019-1705533USN
linux-doc
5.0.0-35.38
CVE-2019-015455USN
linux-doc
5.0.0-35.38
CVE-2019-1705233USN
linux-doc
5.0.0-35.38
CVE-2019-1705433USN
linux-doc
5.0.0-35.38
CVE-2019-1908171USN
linux-doc
5.0.0-35.38
CVE-2019-1509849USN
linux-doc
5.0.0-35.38
CVE-2019-1766688USN
linux-doc
5.0.0-35.38
CVE-2019-1705633USN
linux-doc
5.0.0-35.38
CVE-2019-1880655USN
linux-doc
5.0.0-35.38
CVE-2019-1113565USN
linux-doc
5.0.0-35.38
CVE-2019-1953324USN
linux-doc
5.0.0-35.38

Raw Object

{
  "sha256": "1a9bf36ce7d6f97ea413fdc9e1e62cdeabe6b64b903fc64e6d8ef2b92dbea0e5",
  "sha1": "badbd9609909b2bc86ce6c887b9baf73fc82278f",
  "md5": "3da8b6f08fb468fc4533071fa9103234",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-image-5.0.0-32-lowlatency",
  "filename": "linux-image-5.0.0-32-lowlatency_5.0.0-32.34_i386.deb",
  "size": 8051,
  "description": "Linux kernel image for version 5.0.0 on 32 bit x86 SMP\nThis package contains the Linux kernel image for version 5.0.0 on\n32 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.0.0-32.34",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-32-lowlatency",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T00:25:27+00:00",
      "updated_at": "2021-10-27T00:25:27+00:00"
    },
    {
      "name": "CVE-2019-17052",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T00:47:55+00:00",
      "updated_at": "2021-10-27T00:47:55+00:00"
    },
    {
      "name": "CVE-2019-17054",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T04:51:09+00:00",
      "updated_at": "2021-10-27T04:51:09+00:00"
    },
    {
      "name": "CVE-2019-19080",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T06:07:16+00:00",
      "updated_at": "2021-10-27T06:07:16+00:00"
    },
    {
      "name": "CVE-2019-17056",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T12:42:02+00:00",
      "updated_at": "2021-10-27T12:42:02+00:00"
    },
    {
      "name": "CVE-2019-19533",
      "risk": 24,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T17:19:05+00:00",
      "updated_at": "2021-10-27T17:19:05+00:00"
    },
    {
      "name": "CVE-2019-17055",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T18:55:52+00:00",
      "updated_at": "2021-10-27T18:55:52+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-27T19:14:38+00:00",
      "updated_at": "2021-10-27T19:14:38+00:00"
    },
    {
      "name": "CVE-2019-17053",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-28T01:24:35+00:00",
      "updated_at": "2021-10-28T01:24:35+00:00"
    },
    {
      "name": "CVE-2019-19081",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-28T03:09:29+00:00",
      "updated_at": "2021-10-28T03:09:29+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-28T06:16:40+00:00",
      "updated_at": "2021-10-28T06:16:40+00:00"
    },
    {
      "name": "CVE-2019-17666",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-28T06:32:58+00:00",
      "updated_at": "2021-10-28T06:32:58+00:00"
    },
    {
      "name": "CVE-2019-18806",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-28T06:34:39+00:00",
      "updated_at": "2021-10-28T06:34:39+00:00"
    },
    {
      "name": "CVE-2019-15098",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ce0de22f7658fdf58f15acb087d0b057896734ef0fb5e9c076f3be6d980c4fd0",
        "name": "linux-libc-dev",
        "version": "5.0.0-35.38",
        "filename": "linux-libc-dev_5.0.0-35.38_i386.deb"
      },
      "created_at": "2021-10-28T06:59:24+00:00",
      "updated_at": "2021-10-28T06:59:24+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-28T08:13:05+00:00",
      "updated_at": "2021-10-28T08:13:05+00:00"
    },
    {
      "name": "CVE-2019-19080",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-28T17:43:07+00:00",
      "updated_at": "2021-10-28T17:43:07+00:00"
    },
    {
      "name": "CVE-2019-17053",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-28T19:39:11+00:00",
      "updated_at": "2021-10-28T19:39:11+00:00"
    },
    {
      "name": "CVE-2019-17055",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-28T22:06:42+00:00",
      "updated_at": "2021-10-28T22:06:42+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-28T23:37:53+00:00",
      "updated_at": "2021-10-28T23:37:53+00:00"
    },
    {
      "name": "CVE-2019-17052",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-29T02:01:14+00:00",
      "updated_at": "2021-10-29T02:01:14+00:00"
    },
    {
      "name": "CVE-2019-17054",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-29T02:30:55+00:00",
      "updated_at": "2021-10-29T02:30:55+00:00"
    },
    {
      "name": "CVE-2019-19081",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-29T03:08:19+00:00",
      "updated_at": "2021-10-29T03:08:19+00:00"
    },
    {
      "name": "CVE-2019-15098",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-29T12:57:13+00:00",
      "updated_at": "2021-10-29T12:57:13+00:00"
    },
    {
      "name": "CVE-2019-17666",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-29T15:54:21+00:00",
      "updated_at": "2021-10-29T15:54:21+00:00"
    },
    {
      "name": "CVE-2019-17056",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-29T20:02:48+00:00",
      "updated_at": "2021-10-29T20:02:48+00:00"
    },
    {
      "name": "CVE-2019-18806",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-30T03:35:00+00:00",
      "updated_at": "2021-10-30T03:35:00+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-30T06:29:04+00:00",
      "updated_at": "2021-10-30T06:29:04+00:00"
    },
    {
      "name": "CVE-2019-19533",
      "risk": 24,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d5f00b09585691889ddc7a907b969c98ee1d2678bdcaf3cdfd4c4f05f04aa1ce",
        "name": "linux-doc",
        "version": "5.0.0-35.38",
        "filename": "linux-doc_5.0.0-35.38_all.deb"
      },
      "created_at": "2021-10-30T12:56:33+00:00",
      "updated_at": "2021-10-30T12:56:33+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2019-10-02T05:27:09+00:00",
  "updated_at": "2021-03-21T08:47:47+00:00",
  "deleted_at": null
}