Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (22)

linux-image-unsigned-5.0.0-1026-oem-osp1

Hashes
Linux kernel image for version 5.0.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.0.0 on 64 bit x86 SMP. Supports OEM OSP1 processors. Geared toward desktop systems. You likely do not want to install this package directly. Instead, install the linux-oem-osp1 meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 6ef17fb1309939986a970b26191565f0a22f271bac28bbb10b2e1fb7065889b6
  • SHA1: d792c2a62ddb487b7db5aed1dad012a91c908dea
  • MD5: d8a3fac8ae183c36fe965a8f3bb05ea1
Information
  • Version: 5.0.0-1026.29
  • Filename: linux-image-unsigned-5.0.0-1026-oem-osp1_5.0.0-1026.29_amd64.deb
  • Size: 8859
  • Type: DEB
  • Source: linux-oem-osp1
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-1026-oem-osp1

Vulnerabilities

NameRiskSourceFixed
CVE-2019-1952861USN
linux-oem-osp1-tools-host
5.0.0-1030.34
CVE-2019-1953324USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1705233USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1907671USN
linux-oem-osp1-tools-host
5.0.0-1030.34
CVE-2019-1952549USN
linux-oem-osp1-tools-host
5.0.0-1030.34
CVE-2019-1952349USN
linux-oem-osp1-tools-host
5.0.0-1030.34
CVE-2019-015455USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1880655USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1908071USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1705333USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1908171USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-015578USN
USN-4184-2
CVE-2019-1579472USN
linux-oem-osp1-tools-host
5.0.0-1030.34
CVE-2019-1766688USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-015578USN
linux-oem-osp1-tools-host
5.0.0-1028.32
CVE-2019-1705433USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1509849USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1674698USN
linux-oem-osp1-tools-host
5.0.0-1030.34
CVE-2019-1705633USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1705533USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2019-1113565USN
linux-oem-osp1-tools-host
5.0.0-1027.31
CVE-2018-1220765USN
linux-oem-osp1-tools-host
5.0.0-1027.31

Raw Object

{
  "sha256": "6ef17fb1309939986a970b26191565f0a22f271bac28bbb10b2e1fb7065889b6",
  "sha1": "d792c2a62ddb487b7db5aed1dad012a91c908dea",
  "md5": "d8a3fac8ae183c36fe965a8f3bb05ea1",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.0.0-1026-oem-osp1",
  "filename": "linux-image-unsigned-5.0.0-1026-oem-osp1_5.0.0-1026.29_amd64.deb",
  "size": 8859,
  "description": "Linux kernel image for version 5.0.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.0.0 on\n64 bit x86 SMP.\n\nSupports OEM OSP1 processors.\n\nGeared toward desktop systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem-osp1 meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.0.0-1026.29",
  "source": "linux-oem-osp1",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-1026-oem-osp1",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2019-19528",
      "risk": 61,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "45eb9463cb4e605888802564cbdf9bad5656c17c22e78c70c2427e13329e6317",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1030.34",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1030.34_all.deb"
      },
      "created_at": "2021-03-21T01:42:26+00:00",
      "updated_at": "2021-03-21T01:42:26+00:00"
    },
    {
      "name": "CVE-2019-19533",
      "risk": 24,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T04:33:46+00:00",
      "updated_at": "2021-03-22T04:33:46+00:00"
    },
    {
      "name": "CVE-2019-17052",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:11:41+00:00",
      "updated_at": "2021-06-30T01:29:36+00:00"
    },
    {
      "name": "CVE-2019-19076",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "45eb9463cb4e605888802564cbdf9bad5656c17c22e78c70c2427e13329e6317",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1030.34",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1030.34_all.deb"
      },
      "created_at": "2021-03-22T05:14:04+00:00",
      "updated_at": "2021-06-29T21:43:59+00:00"
    },
    {
      "name": "CVE-2019-19525",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "45eb9463cb4e605888802564cbdf9bad5656c17c22e78c70c2427e13329e6317",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1030.34",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1030.34_all.deb"
      },
      "created_at": "2021-03-22T05:18:17+00:00",
      "updated_at": "2021-03-22T05:18:17+00:00"
    },
    {
      "name": "CVE-2019-19523",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "45eb9463cb4e605888802564cbdf9bad5656c17c22e78c70c2427e13329e6317",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1030.34",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1030.34_all.deb"
      },
      "created_at": "2021-03-22T05:24:11+00:00",
      "updated_at": "2021-03-22T05:24:11+00:00"
    },
    {
      "name": "CVE-2019-0154",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:28:12+00:00",
      "updated_at": "2021-06-30T00:25:05+00:00"
    },
    {
      "name": "CVE-2019-18806",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:30:47+00:00",
      "updated_at": "2021-03-22T05:30:47+00:00"
    },
    {
      "name": "CVE-2019-19080",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:42:21+00:00",
      "updated_at": "2021-03-22T05:42:21+00:00"
    },
    {
      "name": "CVE-2019-17053",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:43:01+00:00",
      "updated_at": "2021-06-30T00:26:19+00:00"
    },
    {
      "name": "CVE-2019-19081",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:43:39+00:00",
      "updated_at": "2021-03-22T05:43:39+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "USN",
      "sid": "USN-4184-2",
      "fixed": null,
      "created_at": "2021-04-28T14:22:27+00:00",
      "updated_at": "2021-04-28T14:22:27+00:00"
    },
    {
      "name": "CVE-2019-15794",
      "risk": 72,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "45eb9463cb4e605888802564cbdf9bad5656c17c22e78c70c2427e13329e6317",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1030.34",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1030.34_all.deb"
      },
      "created_at": "2021-03-22T04:33:32+00:00",
      "updated_at": "2021-06-29T21:43:53+00:00"
    },
    {
      "name": "CVE-2019-17666",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:29:54+00:00",
      "updated_at": "2021-06-29T22:18:51+00:00"
    },
    {
      "name": "CVE-2019-0155",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a3c7feeb12211dd8f74b731d400d165610ca3f21e7ec2bf92db7562245ccc0a5",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1028.32",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1028.32_all.deb"
      },
      "created_at": "2021-03-22T05:22:15+00:00",
      "updated_at": "2021-06-29T22:34:34+00:00"
    },
    {
      "name": "CVE-2019-17054",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-21T15:15:08+00:00",
      "updated_at": "2021-06-29T22:45:31+00:00"
    },
    {
      "name": "CVE-2019-15098",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-21T01:31:39+00:00",
      "updated_at": "2021-06-29T23:41:19+00:00"
    },
    {
      "name": "CVE-2019-16746",
      "risk": 98,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "45eb9463cb4e605888802564cbdf9bad5656c17c22e78c70c2427e13329e6317",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1030.34",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1030.34_all.deb"
      },
      "created_at": "2021-03-22T04:40:43+00:00",
      "updated_at": "2021-06-29T23:51:09+00:00"
    },
    {
      "name": "CVE-2019-17056",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T04:45:38+00:00",
      "updated_at": "2021-06-30T00:18:25+00:00"
    },
    {
      "name": "CVE-2019-17055",
      "risk": 33,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:42:05+00:00",
      "updated_at": "2021-06-30T03:58:31+00:00"
    },
    {
      "name": "CVE-2019-11135",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-22T05:23:47+00:00",
      "updated_at": "2021-06-30T04:37:28+00:00"
    },
    {
      "name": "CVE-2018-12207",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f9bec9826c422d601590a7191295e80155de5baf45bbcfce38be74e6a4fdaff3",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1027.31",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1027.31_all.deb"
      },
      "created_at": "2021-03-21T04:01:07+00:00",
      "updated_at": "2021-06-30T21:15:38+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-10-23T12:02:10+00:00",
  "updated_at": "2021-03-04T11:51:44+00:00",
  "deleted_at": null
}