8c7de5ba3f3d437f705cc1c55c8f9b27a9d734f890eb2fd0dc6d0fa8350ae040
d11a00f20a6942677e6815c81a12f7817b93e4f1
68c27f3ded65bd06482f96b381d3aa1a
5.0.0-1059.64
linux-oem-osp1-tools-host_5.0.0-1059.64_all.deb
451
DEB
linux-oem-osp1
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
python3
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-11935 | 6 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-10732 | 44 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-10766 | 55 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2019-20908 | 69 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-15780 | 72 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-12656 | 55 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-10768 | 55 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-13974 | 78 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-10767 | 55 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2019-19462 | 55 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2020-10757 | 78 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2019-20810 | 55 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2019-19036 | 55 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
CVE-2019-16089 | 47 | USN | linux-oem-osp1-tools-host 5.0.0-1065.70 |
{ "sha256": "8c7de5ba3f3d437f705cc1c55c8f9b27a9d734f890eb2fd0dc6d0fa8350ae040", "sha1": "d11a00f20a6942677e6815c81a12f7817b93e4f1", "md5": "68c27f3ded65bd06482f96b381d3aa1a", "type": "DEB", "arch": "ALL", "name": "linux-oem-osp1-tools-host", "filename": "linux-oem-osp1-tools-host_5.0.0-1059.64_all.deb", "size": 451, "description": "Linux kernel VM host tools\nThis package provides kernel tools useful for VM hosts.", "url": null, "version": "5.0.0-1059.64", "source": "linux-oem-osp1", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "python3", "applications": [], "vulnerabilities": [ { "name": "CVE-2020-11935", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-21T07:19:05+00:00", "updated_at": "2021-06-30T22:32:20+00:00" }, { "name": "CVE-2020-10732", "risk": 44, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:33:30+00:00", "updated_at": "2021-06-29T21:51:36+00:00" }, { "name": "CVE-2020-10766", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T05:04:12+00:00", "updated_at": "2021-06-30T04:40:34+00:00" }, { "name": "CVE-2019-20908", "risk": 69, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T05:37:41+00:00", "updated_at": "2021-06-29T22:19:31+00:00" }, { "name": "CVE-2020-15780", "risk": 72, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:58:09+00:00", "updated_at": "2021-06-29T21:19:38+00:00" }, { "name": "CVE-2020-12656", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:31:17+00:00", "updated_at": "2021-06-29T21:45:27+00:00" }, { "name": "CVE-2020-10768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:50:09+00:00", "updated_at": "2021-06-29T22:09:43+00:00" }, { "name": "CVE-2020-13974", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:51:27+00:00", "updated_at": "2021-06-29T23:51:26+00:00" }, { "name": "CVE-2020-10767", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:53:00+00:00", "updated_at": "2021-06-30T00:18:09+00:00" }, { "name": "CVE-2019-19462", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:35:05+00:00", "updated_at": "2021-06-30T00:44:35+00:00" }, { "name": "CVE-2020-10757", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-21T15:58:41+00:00", "updated_at": "2021-06-30T01:56:25+00:00" }, { "name": "CVE-2019-20810", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-22T04:34:42+00:00", "updated_at": "2021-06-30T02:10:01+00:00" }, { "name": "CVE-2019-19036", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-21T01:16:43+00:00", "updated_at": "2021-06-30T04:37:39+00:00" }, { "name": "CVE-2019-16089", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "a28ef03ddb1413726d5e73893b660f43f2dc7093c549a1c1eaae664e1b162a32", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1065.70", "filename": "linux-oem-osp1-tools-host_5.0.0-1065.70_all.deb" }, "created_at": "2021-03-21T07:45:13+00:00", "updated_at": "2021-06-30T21:43:06+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2020-06-06T14:33:11+00:00", "updated_at": "2021-03-04T12:04:03+00:00", "deleted_at": null }