af2bec976906c2313bed12d7f267d5b6e2553bd953cccab224136155ad07f7be
8c194af13f9bdf6b00d963aec805acb17e870507
194b980e255bd90a40b26a9b675b3bf6
4.19.146-1
linux-headers-4.19.0-11-all_4.19.146-1_amd64.deb
477
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-4.19.0-11-all-amd64 (= 4.19.146-1)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-12351 | 88 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
{ "sha256": "af2bec976906c2313bed12d7f267d5b6e2553bd953cccab224136155ad07f7be", "sha1": "8c194af13f9bdf6b00d963aec805acb17e870507", "md5": "194b980e255bd90a40b26a9b675b3bf6", "type": "DEB", "arch": "AMD64", "name": "linux-headers-4.19.0-11-all", "filename": "linux-headers-4.19.0-11-all_4.19.146-1_amd64.deb", "size": 477, "description": "All header files for Linux 4.19 (meta-package)\nThis package depends against all architecture-specific kernel header files\nfor Linux kernel version 4.19, generally used for building out-of-tree\nkernel modules.", "url": "https://www.kernel.org/", "version": "4.19.146-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-4.19.0-11-all-amd64 (= 4.19.146-1)", "applications": [], "vulnerabilities": [ { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:38+00:00", "updated_at": "2021-03-09T07:31:38+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:49+00:00", "updated_at": "2021-03-09T07:31:49+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:59+00:00", "updated_at": "2021-03-09T07:31:59+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:07+00:00", "updated_at": "2021-03-09T07:32:07+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:16+00:00", "updated_at": "2021-03-09T07:32:16+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:16+00:00", "updated_at": "2021-03-21T07:40:16+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:18+00:00", "updated_at": "2021-03-21T07:40:18+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:20+00:00", "updated_at": "2021-03-21T07:40:20+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:22+00:00", "updated_at": "2021-03-21T07:40:22+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:23+00:00", "updated_at": "2021-03-21T07:40:23+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2020-09-18T21:23:43+00:00", "updated_at": "2021-03-09T01:44:12+00:00", "deleted_at": null }