94331a4f745098919c804b9aba28d3274e1c64dcfd9e87f8a9f6925e0f2cb4a4
b12881fadccf209c7cb928da5521ce87954a04f8
77c3b3db14bf330b7ec8ab9a4d7af0a8
4.4.0-1077.87
linux-image-4.4.0-1077-aws_4.4.0-1077.87_amd64.deb
7088
DEB
linux-aws
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base, linux-modules-4.4.0-1077-aws
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-3819 | 49 | USN USN-4118-1 | |
CVE-2018-14611 | 71 | USN USN-4118-1 | |
CVE-2018-14614 | 71 | USN USN-4118-1 | |
CVE-2019-3701 | 49 | USN USN-4118-1 | |
CVE-2018-14612 | 71 | USN USN-4118-1 | |
CVE-2019-7222 | 55 | USN USN-3933-2 | |
CVE-2019-3459 | 65 | USN USN-3933-2 | |
CVE-2020-10769 | 55 | USN | |
CVE-2019-3460 | 65 | USN USN-3933-2 | |
CVE-2018-9517 | 72 | USN USN-3932-2 | |
CVE-2019-6974 | 81 | USN USN-3933-2 | |
CVE-2019-9213 | 55 | USN USN-3933-2 | |
CVE-2018-16884 | 80 | USN USN-3981-2 | |
CVE-2018-13097 | 55 | USN USN-4118-1 | |
CVE-2019-7221 | 78 | USN USN-3932-2 | |
CVE-2018-13100 | 55 | USN USN-4118-1 | |
CVE-2018-13099 | 55 | USN USN-4118-1 | |
CVE-2018-14610 | 71 | USN USN-4118-1 | |
CVE-2018-14616 | 71 | USN USN-4118-1 | |
CVE-2018-14613 | 71 | USN USN-4118-1 | |
CVE-2017-18249 | 70 | USN USN-3932-2 |
{ "sha256": "94331a4f745098919c804b9aba28d3274e1c64dcfd9e87f8a9f6925e0f2cb4a4", "sha1": "b12881fadccf209c7cb928da5521ce87954a04f8", "md5": "77c3b3db14bf330b7ec8ab9a4d7af0a8", "type": "DEB", "arch": "AMD64", "name": "linux-image-4.4.0-1077-aws", "filename": "linux-image-4.4.0-1077-aws_4.4.0-1077.87_amd64.deb", "size": 7088, "description": "Linux kernel image for version 4.4.0 on 64 bit x86 SMP\nThis package contains the Linux kernel image for version 4.4.0 on\n64 bit x86 SMP.\n\nSupports AWS processors.\n\nGeared toward Amazon Web Services (AWS) systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-aws meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.4.0-1077.87", "source": "linux-aws", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base, linux-modules-4.4.0-1077-aws", "applications": [], "vulnerabilities": [ { "name": "CVE-2019-3819", "risk": 49, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-20T19:04:44+00:00", "updated_at": "2021-03-20T19:04:44+00:00" }, { "name": "CVE-2018-14611", "risk": 71, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-20T19:17:20+00:00", "updated_at": "2021-03-20T19:17:20+00:00" }, { "name": "CVE-2018-14614", "risk": 71, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-21T16:01:25+00:00", "updated_at": "2021-03-21T16:01:25+00:00" }, { "name": "CVE-2019-3701", "risk": 49, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-21T16:36:10+00:00", "updated_at": "2021-03-21T16:36:10+00:00" }, { "name": "CVE-2018-14612", "risk": 71, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-21T20:36:37+00:00", "updated_at": "2021-03-21T20:36:37+00:00" }, { "name": "CVE-2019-7222", "risk": 55, "source": "USN", "sid": "USN-3933-2", "fixed": null, "created_at": "2021-03-21T21:05:31+00:00", "updated_at": "2021-03-21T21:05:31+00:00" }, { "name": "CVE-2019-3459", "risk": 65, "source": "USN", "sid": "USN-3933-2", "fixed": null, "created_at": "2021-03-22T04:06:37+00:00", "updated_at": "2021-03-22T04:06:37+00:00" }, { "name": "CVE-2020-10769", "risk": 55, "source": "USN", "sid": null, "fixed": null, "created_at": "2021-03-22T04:29:47+00:00", "updated_at": "2021-03-22T04:29:47+00:00" }, { "name": "CVE-2019-3460", "risk": 65, "source": "USN", "sid": "USN-3933-2", "fixed": null, "created_at": "2021-03-22T04:40:13+00:00", "updated_at": "2021-03-22T04:40:13+00:00" }, { "name": "CVE-2018-9517", "risk": 72, "source": "USN", "sid": "USN-3932-2", "fixed": null, "created_at": "2021-03-22T04:40:52+00:00", "updated_at": "2021-03-22T04:40:52+00:00" }, { "name": "CVE-2019-6974", "risk": 81, "source": "USN", "sid": "USN-3933-2", "fixed": null, "created_at": "2021-03-22T04:52:54+00:00", "updated_at": "2021-03-22T04:52:54+00:00" }, { "name": "CVE-2019-9213", "risk": 55, "source": "USN", "sid": "USN-3933-2", "fixed": null, "created_at": "2021-03-22T04:53:39+00:00", "updated_at": "2021-03-22T04:53:39+00:00" }, { "name": "CVE-2018-16884", "risk": 80, "source": "USN", "sid": "USN-3981-2", "fixed": null, "created_at": "2021-03-22T04:58:28+00:00", "updated_at": "2021-03-22T04:58:28+00:00" }, { "name": "CVE-2018-13097", "risk": 55, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-22T05:19:09+00:00", "updated_at": "2021-03-22T05:19:09+00:00" }, { "name": "CVE-2019-7221", "risk": 78, "source": "USN", "sid": "USN-3932-2", "fixed": null, "created_at": "2021-03-22T05:28:18+00:00", "updated_at": "2021-03-22T05:28:18+00:00" }, { "name": "CVE-2018-13100", "risk": 55, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-22T05:48:47+00:00", "updated_at": "2021-03-22T05:48:47+00:00" }, { "name": "CVE-2018-13099", "risk": 55, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-22T05:58:44+00:00", "updated_at": "2021-03-22T05:58:44+00:00" }, { "name": "CVE-2018-14610", "risk": 71, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-22T06:17:11+00:00", "updated_at": "2021-03-22T06:17:11+00:00" }, { "name": "CVE-2018-14616", "risk": 71, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-22T06:48:28+00:00", "updated_at": "2021-03-22T06:48:28+00:00" }, { "name": "CVE-2018-14613", "risk": 71, "source": "USN", "sid": "USN-4118-1", "fixed": null, "created_at": "2021-03-22T06:55:04+00:00", "updated_at": "2021-03-22T06:55:04+00:00" }, { "name": "CVE-2017-18249", "risk": 70, "source": "USN", "sid": "USN-3932-2", "fixed": null, "created_at": "2021-03-22T10:52:19+00:00", "updated_at": "2021-03-22T10:52:19+00:00" } ], "risk": 81, "vulnerable": 81, "outdated": 0, "malicious": 0, "created_at": "2019-03-06T00:58:15+00:00", "updated_at": "2021-03-19T09:55:15+00:00", "deleted_at": null }