36b1bca4911b0f52ec3735ba7730644b35c22841530f2b127f539fa7faca8ea7
7c36fd4265e702937bd724dd0c0b39254119fa3a
08593ebab7c8375500057577c3ac3596
4.4.0-159.187
linux-image-unsigned-4.4.0-159-lowlatency_4.4.0-159.187_amd64.deb
7543
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.4.0-159-lowlatency
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2018-20856 | 78 | USN USN-4118-1 | linux-source-4.4.0 4.4.0-161.189 |
CVE-2019-14284 | 62 | USN USN-4118-1 | linux-source-4.4.0 4.4.0-161.189 |
CVE-2019-10638 | 65 | USN USN-4118-1 | linux-source-4.4.0 4.4.0-161.189 |
CVE-2019-3900 | 77 | USN USN-4118-1 | linux-source-4.4.0 4.4.0-161.189 |
CVE-2019-14283 | 68 | USN USN-4118-1 | linux-source-4.4.0 4.4.0-161.189 |
CVE-2019-14283 | 68 | USN | linux-libc-dev 4.4.0-161.189 |
CVE-2019-13648 | 55 | USN USN-4116-1 | linux-source-4.4.0 4.4.0-161.189 |
CVE-2019-14284 | 62 | USN | linux-libc-dev 4.4.0-161.189 |
CVE-2019-10638 | 65 | USN | linux-libc-dev 4.4.0-161.189 |
CVE-2019-3900 | 77 | USN | linux-libc-dev 4.4.0-161.189 |
CVE-2019-3900 | 77 | USN | |
CVE-2019-14284 | 62 | USN | |
CVE-2019-14283 | 68 | USN | |
CVE-2019-10638 | 65 | USN | |
CVE-2019-13648 | 55 | USN | |
CVE-2018-20856 | 78 | USN | |
CVE-2019-13648 | 55 | USN | linux-libc-dev 4.4.0-161.189 |
CVE-2018-20856 | 78 | USN | linux-libc-dev 4.4.0-161.189 |
{ "sha256": "36b1bca4911b0f52ec3735ba7730644b35c22841530f2b127f539fa7faca8ea7", "sha1": "7c36fd4265e702937bd724dd0c0b39254119fa3a", "md5": "08593ebab7c8375500057577c3ac3596", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-4.4.0-159-lowlatency", "filename": "linux-image-unsigned-4.4.0-159-lowlatency_4.4.0-159.187_amd64.deb", "size": 7543, "description": "Linux kernel image for version 4.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 4.4.0 on\n64 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.4.0-159.187", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.4.0-159-lowlatency", "applications": [], "vulnerabilities": [ { "name": "CVE-2018-20856", "risk": 78, "source": "USN", "sid": "USN-4118-1", "fixed": { "sha256": "c14ee0273212dae243e70008d727d85d6dc7308a5cc34fdf52576a922b0e1bd3", "name": "linux-source-4.4.0", "version": "4.4.0-161.189", "filename": "linux-source-4.4.0_4.4.0-161.189_all.deb" }, "created_at": "2021-03-21T22:38:14+00:00", "updated_at": "2021-03-21T22:38:14+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "USN", "sid": "USN-4118-1", "fixed": { "sha256": "c14ee0273212dae243e70008d727d85d6dc7308a5cc34fdf52576a922b0e1bd3", "name": "linux-source-4.4.0", "version": "4.4.0-161.189", "filename": "linux-source-4.4.0_4.4.0-161.189_all.deb" }, "created_at": "2021-03-22T04:25:30+00:00", "updated_at": "2021-03-22T04:25:30+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "USN", "sid": "USN-4118-1", "fixed": { "sha256": "c14ee0273212dae243e70008d727d85d6dc7308a5cc34fdf52576a922b0e1bd3", "name": "linux-source-4.4.0", "version": "4.4.0-161.189", "filename": "linux-source-4.4.0_4.4.0-161.189_all.deb" }, "created_at": "2021-03-22T05:02:38+00:00", "updated_at": "2021-03-22T05:02:38+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "USN", "sid": "USN-4118-1", "fixed": { "sha256": "c14ee0273212dae243e70008d727d85d6dc7308a5cc34fdf52576a922b0e1bd3", "name": "linux-source-4.4.0", "version": "4.4.0-161.189", "filename": "linux-source-4.4.0_4.4.0-161.189_all.deb" }, "created_at": "2021-03-22T05:09:06+00:00", "updated_at": "2021-03-22T05:09:06+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "USN", "sid": "USN-4118-1", "fixed": { "sha256": "c14ee0273212dae243e70008d727d85d6dc7308a5cc34fdf52576a922b0e1bd3", "name": "linux-source-4.4.0", "version": "4.4.0-161.189", "filename": "linux-source-4.4.0_4.4.0-161.189_all.deb" }, "created_at": "2021-03-22T05:10:07+00:00", "updated_at": "2021-03-22T05:10:07+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "USN", "sid": null, "fixed": { "sha256": "b30936bb6975dc932da3c0119b64d1c6e7ce023e4b7ab315e79eb55f182d2869", "name": "linux-libc-dev", "version": "4.4.0-161.189", "filename": "linux-libc-dev_4.4.0-161.189_amd64.deb" }, "created_at": "2021-07-17T11:25:44+00:00", "updated_at": "2021-07-17T11:25:44+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "USN", "sid": "USN-4116-1", "fixed": { "sha256": "c14ee0273212dae243e70008d727d85d6dc7308a5cc34fdf52576a922b0e1bd3", "name": "linux-source-4.4.0", "version": "4.4.0-161.189", "filename": "linux-source-4.4.0_4.4.0-161.189_all.deb" }, "created_at": "2021-03-22T05:30:57+00:00", "updated_at": "2021-03-22T05:30:57+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "USN", "sid": null, "fixed": { "sha256": "b30936bb6975dc932da3c0119b64d1c6e7ce023e4b7ab315e79eb55f182d2869", "name": "linux-libc-dev", "version": "4.4.0-161.189", "filename": "linux-libc-dev_4.4.0-161.189_amd64.deb" }, "created_at": "2021-07-17T09:27:17+00:00", "updated_at": "2021-07-17T09:27:17+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "USN", "sid": null, "fixed": { "sha256": "b30936bb6975dc932da3c0119b64d1c6e7ce023e4b7ab315e79eb55f182d2869", "name": "linux-libc-dev", "version": "4.4.0-161.189", "filename": "linux-libc-dev_4.4.0-161.189_amd64.deb" }, "created_at": "2021-07-17T10:13:44+00:00", "updated_at": "2021-07-17T10:13:44+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "USN", "sid": null, "fixed": { "sha256": "b30936bb6975dc932da3c0119b64d1c6e7ce023e4b7ab315e79eb55f182d2869", "name": "linux-libc-dev", "version": "4.4.0-161.189", "filename": "linux-libc-dev_4.4.0-161.189_amd64.deb" }, "created_at": "2021-07-17T10:50:28+00:00", "updated_at": "2021-07-17T10:50:28+00:00" }, { "name": "CVE-2019-3900", "risk": 77, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-29T22:46:39+00:00", "updated_at": "2021-06-29T22:46:39+00:00" }, { "name": "CVE-2019-14284", "risk": 62, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-29T22:51:14+00:00", "updated_at": "2021-06-29T22:51:14+00:00" }, { "name": "CVE-2019-14283", "risk": 68, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-29T23:34:18+00:00", "updated_at": "2021-06-29T23:34:18+00:00" }, { "name": "CVE-2019-10638", "risk": 65, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-30T00:28:11+00:00", "updated_at": "2021-06-30T00:28:11+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-30T02:07:09+00:00", "updated_at": "2021-06-30T02:07:09+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-06-30T04:03:04+00:00", "updated_at": "2021-06-30T04:03:04+00:00" }, { "name": "CVE-2019-13648", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "b30936bb6975dc932da3c0119b64d1c6e7ce023e4b7ab315e79eb55f182d2869", "name": "linux-libc-dev", "version": "4.4.0-161.189", "filename": "linux-libc-dev_4.4.0-161.189_amd64.deb" }, "created_at": "2021-07-17T12:30:18+00:00", "updated_at": "2021-07-17T12:30:18+00:00" }, { "name": "CVE-2018-20856", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "b30936bb6975dc932da3c0119b64d1c6e7ce023e4b7ab315e79eb55f182d2869", "name": "linux-libc-dev", "version": "4.4.0-161.189", "filename": "linux-libc-dev_4.4.0-161.189_amd64.deb" }, "created_at": "2021-07-17T14:01:07+00:00", "updated_at": "2021-07-17T14:01:07+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2019-08-01T19:24:10+00:00", "updated_at": "2021-03-20T17:24:12+00:00", "deleted_at": null }