a40751dba7fbd91a6f23f381eff3132cc478e49c27ab3ac7c22e4e095cc7c4f3
79a17fe95ead8b4d396c70836ba48ec10d4c9034
859ba58d4c5fda64a6f55ec3776adf3f
5.0.0-1024.27
linux-image-unsigned-5.0.0-1024-oem-osp1_5.0.0-1024.27_amd64.deb
8812
DEB
linux-oem-osp1
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-1024-oem-osp1
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-14815 | 78 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-15504 | 100 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-15902 | 56 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-19319 | 65 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-2181 | 78 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-15505 | 100 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-14814 | 78 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-14821 | 88 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-14816 | 78 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-16714 | 75 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-19536 | 46 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-19537 | 47 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-19535 | 46 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-19527 | 72 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-9453 | 44 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-19530 | 49 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
CVE-2019-19531 | 68 | USN | linux-oem-osp1-tools-host 5.0.0-1025.28 |
{ "sha256": "a40751dba7fbd91a6f23f381eff3132cc478e49c27ab3ac7c22e4e095cc7c4f3", "sha1": "79a17fe95ead8b4d396c70836ba48ec10d4c9034", "md5": "859ba58d4c5fda64a6f55ec3776adf3f", "type": "DEB", "arch": "AMD64", "name": "linux-image-unsigned-5.0.0-1024-oem-osp1", "filename": "linux-image-unsigned-5.0.0-1024-oem-osp1_5.0.0-1024.27_amd64.deb", "size": 8812, "description": "Linux kernel image for version 5.0.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.0.0 on\n64 bit x86 SMP.\n\nSupports OEM OSP1 processors.\n\nGeared toward desktop systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem-osp1 meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "5.0.0-1024.27", "source": "linux-oem-osp1", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.0.0-1024-oem-osp1", "applications": [], "vulnerabilities": [ { "name": "CVE-2019-14815", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-21T16:40:36+00:00", "updated_at": "2021-06-30T00:36:20+00:00" }, { "name": "CVE-2019-15504", "risk": 100, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T04:38:23+00:00", "updated_at": "2021-06-30T04:06:24+00:00" }, { "name": "CVE-2019-15902", "risk": 56, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T05:33:04+00:00", "updated_at": "2021-06-29T21:49:41+00:00" }, { "name": "CVE-2019-19319", "risk": 65, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T05:12:58+00:00", "updated_at": "2021-06-29T23:05:03+00:00" }, { "name": "CVE-2019-2181", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T05:38:00+00:00", "updated_at": "2021-06-29T23:36:07+00:00" }, { "name": "CVE-2019-15505", "risk": 100, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T05:18:07+00:00", "updated_at": "2021-06-30T01:44:52+00:00" }, { "name": "CVE-2019-14814", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T05:29:17+00:00", "updated_at": "2021-06-30T01:48:49+00:00" }, { "name": "CVE-2019-14821", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T04:38:43+00:00", "updated_at": "2021-06-30T03:06:01+00:00" }, { "name": "CVE-2019-14816", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T05:33:13+00:00", "updated_at": "2021-06-30T03:57:51+00:00" }, { "name": "CVE-2019-16714", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-03-22T05:29:34+00:00", "updated_at": "2021-06-30T04:28:49+00:00" }, { "name": "CVE-2019-19536", "risk": 46, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-10-27T12:39:42+00:00", "updated_at": "2021-10-27T12:39:42+00:00" }, { "name": "CVE-2019-19537", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-10-27T16:07:58+00:00", "updated_at": "2021-10-27T16:07:58+00:00" }, { "name": "CVE-2019-19535", "risk": 46, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-10-27T19:42:23+00:00", "updated_at": "2021-10-27T19:42:23+00:00" }, { "name": "CVE-2019-19527", "risk": 72, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-10-27T22:48:44+00:00", "updated_at": "2021-10-27T22:48:44+00:00" }, { "name": "CVE-2019-9453", "risk": 44, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-10-28T01:14:08+00:00", "updated_at": "2021-10-28T01:14:08+00:00" }, { "name": "CVE-2019-19530", "risk": 49, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-10-28T07:46:04+00:00", "updated_at": "2021-10-28T07:46:04+00:00" }, { "name": "CVE-2019-19531", "risk": 68, "source": "USN", "sid": null, "fixed": { "sha256": "d294fc9dd00c4e576d6be4c1a1a67897a1cfd5ef914ea1838bba19adeedd6334", "name": "linux-oem-osp1-tools-host", "version": "5.0.0-1025.28", "filename": "linux-oem-osp1-tools-host_5.0.0-1025.28_all.deb" }, "created_at": "2021-10-28T07:53:07+00:00", "updated_at": "2021-10-28T07:53:07+00:00" } ], "risk": 100, "vulnerable": 100, "outdated": 0, "malicious": 0, "created_at": "2019-10-04T10:09:10+00:00", "updated_at": "2021-03-04T12:15:05+00:00", "deleted_at": null }