Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (17)

linux-image-unsigned-5.0.0-1024-oem-osp1

Hashes
Linux kernel image for version 5.0.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.0.0 on 64 bit x86 SMP. Supports OEM OSP1 processors. Geared toward desktop systems. You likely do not want to install this package directly. Instead, install the linux-oem-osp1 meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: a40751dba7fbd91a6f23f381eff3132cc478e49c27ab3ac7c22e4e095cc7c4f3
  • SHA1: 79a17fe95ead8b4d396c70836ba48ec10d4c9034
  • MD5: 859ba58d4c5fda64a6f55ec3776adf3f
Information
  • Version: 5.0.0-1024.27
  • Filename: linux-image-unsigned-5.0.0-1024-oem-osp1_5.0.0-1024.27_amd64.deb
  • Size: 8812
  • Type: DEB
  • Source: linux-oem-osp1
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-1024-oem-osp1

Vulnerabilities

NameRiskSourceFixed
CVE-2019-1481578USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-15504100USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1590256USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1931965USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-218178USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-15505100USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1481478USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1482188USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1481678USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1671475USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1953646USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1953747USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1953546USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1952772USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-945344USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1953049USN
linux-oem-osp1-tools-host
5.0.0-1025.28
CVE-2019-1953168USN
linux-oem-osp1-tools-host
5.0.0-1025.28

Raw Object

{
  "sha256": "a40751dba7fbd91a6f23f381eff3132cc478e49c27ab3ac7c22e4e095cc7c4f3",
  "sha1": "79a17fe95ead8b4d396c70836ba48ec10d4c9034",
  "md5": "859ba58d4c5fda64a6f55ec3776adf3f",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.0.0-1024-oem-osp1",
  "filename": "linux-image-unsigned-5.0.0-1024-oem-osp1_5.0.0-1024.27_amd64.deb",
  "size": 8812,
  "description": "Linux kernel image for version 5.0.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.0.0 on\n64 bit x86 SMP.\n\nSupports OEM OSP1 processors.\n\nGeared toward desktop systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem-osp1 meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.0.0-1024.27",
  "source": "linux-oem-osp1",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-1024-oem-osp1",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2019-14815",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-21T16:40:36+00:00",
      "updated_at": "2021-06-30T00:36:20+00:00"
    },
    {
      "name": "CVE-2019-15504",
      "risk": 100,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T04:38:23+00:00",
      "updated_at": "2021-06-30T04:06:24+00:00"
    },
    {
      "name": "CVE-2019-15902",
      "risk": 56,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T05:33:04+00:00",
      "updated_at": "2021-06-29T21:49:41+00:00"
    },
    {
      "name": "CVE-2019-19319",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T05:12:58+00:00",
      "updated_at": "2021-06-29T23:05:03+00:00"
    },
    {
      "name": "CVE-2019-2181",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T05:38:00+00:00",
      "updated_at": "2021-06-29T23:36:07+00:00"
    },
    {
      "name": "CVE-2019-15505",
      "risk": 100,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T05:18:07+00:00",
      "updated_at": "2021-06-30T01:44:52+00:00"
    },
    {
      "name": "CVE-2019-14814",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T05:29:17+00:00",
      "updated_at": "2021-06-30T01:48:49+00:00"
    },
    {
      "name": "CVE-2019-14821",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T04:38:43+00:00",
      "updated_at": "2021-06-30T03:06:01+00:00"
    },
    {
      "name": "CVE-2019-14816",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T05:33:13+00:00",
      "updated_at": "2021-06-30T03:57:51+00:00"
    },
    {
      "name": "CVE-2019-16714",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-03-22T05:29:34+00:00",
      "updated_at": "2021-06-30T04:28:49+00:00"
    },
    {
      "name": "CVE-2019-19536",
      "risk": 46,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-10-27T12:39:42+00:00",
      "updated_at": "2021-10-27T12:39:42+00:00"
    },
    {
      "name": "CVE-2019-19537",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-10-27T16:07:58+00:00",
      "updated_at": "2021-10-27T16:07:58+00:00"
    },
    {
      "name": "CVE-2019-19535",
      "risk": 46,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-10-27T19:42:23+00:00",
      "updated_at": "2021-10-27T19:42:23+00:00"
    },
    {
      "name": "CVE-2019-19527",
      "risk": 72,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-10-27T22:48:44+00:00",
      "updated_at": "2021-10-27T22:48:44+00:00"
    },
    {
      "name": "CVE-2019-9453",
      "risk": 44,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-10-28T01:14:08+00:00",
      "updated_at": "2021-10-28T01:14:08+00:00"
    },
    {
      "name": "CVE-2019-19530",
      "risk": 49,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-10-28T07:46:04+00:00",
      "updated_at": "2021-10-28T07:46:04+00:00"
    },
    {
      "name": "CVE-2019-19531",
      "risk": 68,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334",
        "name": "linux-oem-osp1-tools-host",
        "version": "5.0.0-1025.28",
        "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb"
      },
      "created_at": "2021-10-28T07:53:07+00:00",
      "updated_at": "2021-10-28T07:53:07+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-10-04T10:09:10+00:00",
  "updated_at": "2021-03-04T12:15:05+00:00",
  "deleted_at": null
}