d3223a89a1acb76bd53c95d2cbed7b74425465915d8db5e8b50dc648d0068158
1852e63d73f909f8e0c7698a12775c81240dc869
7b0829d70ad9285066a3475b53bdd48e
4.9.189-3
linux-headers-4.9.0-11-amd64_4.9.189-3_amd64.deb
4194
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-4.9.0-11-common (= 4.9.189-3), linux-kbuild-4.9, linux-compiler-gcc-6-x86 (>= 4.9.82-1+deb9u1~)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-14821 | 88 | DSA DSA-4531-1 | linux-headers-4.9.0-11-amd64 4.9.189-3+deb9u1 |
CVE-2019-14835 | 78 | DSA DSA-4531-1 | linux-headers-4.9.0-11-amd64 4.9.189-3+deb9u1 |
CVE-2019-15117 | 78 | DSA DSA-4531-1 | linux-headers-4.9.0-11-amd64 4.9.189-3+deb9u1 |
CVE-2019-15118 | 55 | DSA DSA-4531-1 | linux-headers-4.9.0-11-amd64 4.9.189-3+deb9u1 |
CVE-2019-15902 | 56 | DSA DSA-4531-1 | linux-headers-4.9.0-11-amd64 4.9.189-3+deb9u1 |
{ "sha256": "d3223a89a1acb76bd53c95d2cbed7b74425465915d8db5e8b50dc648d0068158", "sha1": "1852e63d73f909f8e0c7698a12775c81240dc869", "md5": "7b0829d70ad9285066a3475b53bdd48e", "type": "DEB", "arch": "AMD64", "name": "linux-headers-4.9.0-11-amd64", "filename": "linux-headers-4.9.0-11-amd64_4.9.189-3_amd64.deb", "size": 4194, "description": "Header files for Linux 4.9.0-11-amd64\nThis package provides the architecture-specific kernel header files for\nLinux kernel 4.9.0-11-amd64, generally used for building out-of-tree\nkernel modules. These files are going to be installed into\n/usr/src/linux-headers-4.9.0-11-amd64, and can be used for building\nmodules that load into the kernel provided by the\nlinux-image-4.9.0-11-amd64 package.", "url": "https://www.kernel.org/", "version": "4.9.189-3", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-4.9.0-11-common (= 4.9.189-3), linux-kbuild-4.9, linux-compiler-gcc-6-x86 (>= 4.9.82-1+deb9u1~)", "applications": [], "vulnerabilities": [ { "name": "CVE-2019-14821", "risk": 88, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "a81d2429fc8304dbab103129f7c58abcb82f8e1cb97e596dff323a1917e1a08c", "name": "linux-headers-4.9.0-11-amd64", "version": "4.9.189-3+deb9u1", "filename": "linux-headers-4.9.0-11-amd64_4.9.189-3+deb9u1_amd64.deb" }, "created_at": "2021-03-08T10:01:43+00:00", "updated_at": "2021-03-08T10:01:43+00:00" }, { "name": "CVE-2019-14835", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "a81d2429fc8304dbab103129f7c58abcb82f8e1cb97e596dff323a1917e1a08c", "name": "linux-headers-4.9.0-11-amd64", "version": "4.9.189-3+deb9u1", "filename": "linux-headers-4.9.0-11-amd64_4.9.189-3+deb9u1_amd64.deb" }, "created_at": "2021-03-08T10:01:44+00:00", "updated_at": "2021-03-08T10:01:44+00:00" }, { "name": "CVE-2019-15117", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "a81d2429fc8304dbab103129f7c58abcb82f8e1cb97e596dff323a1917e1a08c", "name": "linux-headers-4.9.0-11-amd64", "version": "4.9.189-3+deb9u1", "filename": "linux-headers-4.9.0-11-amd64_4.9.189-3+deb9u1_amd64.deb" }, "created_at": "2021-03-08T10:01:44+00:00", "updated_at": "2021-03-08T10:01:44+00:00" }, { "name": "CVE-2019-15118", "risk": 55, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "a81d2429fc8304dbab103129f7c58abcb82f8e1cb97e596dff323a1917e1a08c", "name": "linux-headers-4.9.0-11-amd64", "version": "4.9.189-3+deb9u1", "filename": "linux-headers-4.9.0-11-amd64_4.9.189-3+deb9u1_amd64.deb" }, "created_at": "2021-03-08T10:01:45+00:00", "updated_at": "2021-03-08T10:01:45+00:00" }, { "name": "CVE-2019-15902", "risk": 56, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "a81d2429fc8304dbab103129f7c58abcb82f8e1cb97e596dff323a1917e1a08c", "name": "linux-headers-4.9.0-11-amd64", "version": "4.9.189-3+deb9u1", "filename": "linux-headers-4.9.0-11-amd64_4.9.189-3+deb9u1_amd64.deb" }, "created_at": "2021-03-08T10:01:45+00:00", "updated_at": "2021-03-08T10:01:45+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2019-09-02T19:14:45+00:00", "updated_at": "2021-03-07T18:48:39+00:00", "deleted_at": null }