6a1de234631b05d143a4e4cef9c9ad3a93aa05ca80d336e22d9e5c4ecf849e71
9f904f5c4a2905567a37c7fcfa78013b1ee73780
9e06c9ec4eeaa6e0e3cb4d1321cd2209
4.15.0-1045.48
linux-image-unsigned-4.15.0-1045-gke_4.15.0-1045.48_amd64.deb
8537
DEB
linux-gke-4.15
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-1045-gke
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-14815 | 78 | USN USN-4162-2 | |
CVE-2019-14821 | 88 | USN USN-4163-2 | |
CVE-2019-15117 | 78 | USN USN-4163-2 | |
CVE-2019-15118 | 55 | USN USN-4163-2 | |
CVE-2019-19319 | 65 | USN USN-4391-1 | |
CVE-2019-15505 | 100 | USN USN-4163-2 | |
CVE-2019-14814 | 78 | USN USN-4163-2 | |
CVE-2019-15902 | 56 | USN USN-4163-2 | |
CVE-2019-14816 | 78 | USN USN-4163-2 | |
CVE-2019-15918 | 78 | USN USN-4162-2 | |
CVE-2018-21008 | 55 | USN USN-4163-2 |
{ "sha256": "6a1de234631b05d143a4e4cef9c9ad3a93aa05ca80d336e22d9e5c4ecf849e71", "sha1": "9f904f5c4a2905567a37c7fcfa78013b1ee73780", "md5": "9e06c9ec4eeaa6e0e3cb4d1321cd2209", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-4.15.0-1045-gke", "filename": "linux-image-unsigned-4.15.0-1045-gke_4.15.0-1045.48_amd64.deb", "size": 8537, "description": "Linux kernel image for version 4.15.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 4.15.0 on\n64 bit x86 SMP.\n\nSupports amd64 processors.\n\nGeared toward GKE systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-gke meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.15.0-1045.48", "source": "linux-gke-4.15", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-4.15.0-1045-gke", "applications": [], "vulnerabilities": [ { "name": "CVE-2019-14815", "risk": 78, "source": "USN", "sid": "USN-4162-2", "fixed": null, "created_at": "2021-03-21T16:40:19+00:00", "updated_at": "2021-03-21T16:40:19+00:00" }, { "name": "CVE-2019-14821", "risk": 88, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T04:38:42+00:00", "updated_at": "2021-03-22T04:38:42+00:00" }, { "name": "CVE-2019-15117", "risk": 78, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T04:38:55+00:00", "updated_at": "2021-03-22T04:38:55+00:00" }, { "name": "CVE-2019-15118", "risk": 55, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T05:10:37+00:00", "updated_at": "2021-03-22T05:10:37+00:00" }, { "name": "CVE-2019-19319", "risk": 65, "source": "USN", "sid": "USN-4391-1", "fixed": null, "created_at": "2021-03-22T05:13:04+00:00", "updated_at": "2021-03-22T05:13:04+00:00" }, { "name": "CVE-2019-15505", "risk": 100, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T05:18:05+00:00", "updated_at": "2021-03-22T05:18:05+00:00" }, { "name": "CVE-2019-14814", "risk": 78, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T05:29:15+00:00", "updated_at": "2021-03-22T05:29:15+00:00" }, { "name": "CVE-2019-15902", "risk": 56, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T05:33:03+00:00", "updated_at": "2021-03-22T05:33:03+00:00" }, { "name": "CVE-2019-14816", "risk": 78, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T05:33:12+00:00", "updated_at": "2021-03-22T05:33:12+00:00" }, { "name": "CVE-2019-15918", "risk": 78, "source": "USN", "sid": "USN-4162-2", "fixed": null, "created_at": "2021-03-22T05:46:01+00:00", "updated_at": "2021-03-22T05:46:01+00:00" }, { "name": "CVE-2018-21008", "risk": 55, "source": "USN", "sid": "USN-4163-2", "fixed": null, "created_at": "2021-03-22T06:35:38+00:00", "updated_at": "2021-03-22T06:35:38+00:00" } ], "risk": 100, "vulnerable": 100, "outdated": 0, "malicious": 0, "created_at": "2019-09-20T11:01:10+00:00", "updated_at": "2021-03-20T09:07:10+00:00", "deleted_at": null }