d69b609414cadaacdb92b05a310355548d1064d0bcf06516265f3f7d36ad73d2
91eaa76aad7cc2157e9d9b88844e1ea68ce7f819
c0a1f8361d3760a896bdf300300b8528
4.19.146-1
linux-headers-4.19.0-11-all-i386_4.19.146-1_i386.deb
477
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-4.19.0-11-686 (= 4.19.146-1), linux-headers-4.19.0-11-686-pae (= 4.19.146-1), linux-headers-4.19.0-11-rt-686-pae (= 4.19.146-1)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-12351 | 88 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | linux-perf-4.19 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | linux-perf-4.19 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | linux-perf-4.19 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | linux-perf-4.19 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | linux-perf-4.19 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | linux-kbuild-4.19-dbgsym 4.19.152-1 |
{ "sha256": "d69b609414cadaacdb92b05a310355548d1064d0bcf06516265f3f7d36ad73d2", "sha1": "91eaa76aad7cc2157e9d9b88844e1ea68ce7f819", "md5": "c0a1f8361d3760a896bdf300300b8528", "type": "DEB", "arch": "I386", "name": "linux-headers-4.19.0-11-all-i386", "filename": "linux-headers-4.19.0-11-all-i386_4.19.146-1_i386.deb", "size": 477, "description": "All header files for Linux 4.19 (meta-package)\nThis package depends against all architecture-specific kernel header files\nfor Linux kernel version 4.19, generally used for building out-of-tree\nkernel modules.", "url": "https://www.kernel.org/", "version": "4.19.146-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-4.19.0-11-686 (= 4.19.146-1), linux-headers-4.19.0-11-686-pae (= 4.19.146-1), linux-headers-4.19.0-11-rt-686-pae (= 4.19.146-1)", "applications": [], "vulnerabilities": [ { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:38+00:00", "updated_at": "2021-03-09T07:31:38+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:49+00:00", "updated_at": "2021-03-09T07:31:49+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:59+00:00", "updated_at": "2021-03-09T07:31:59+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:07+00:00", "updated_at": "2021-03-09T07:32:07+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "89bd23af05439db92e1eddc5a8b18cca3b57c8a2655c018158e6b8389cfd4b1d", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:16+00:00", "updated_at": "2021-03-09T07:32:16+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d7bd60d94cd4b54afd18077158e50078eee33530ba0ad172cae58ea0caafdbbe", "name": "linux-perf-4.19", "version": "4.19.152-1", "filename": "linux-perf-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:16+00:00", "updated_at": "2021-03-21T07:40:16+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d7bd60d94cd4b54afd18077158e50078eee33530ba0ad172cae58ea0caafdbbe", "name": "linux-perf-4.19", "version": "4.19.152-1", "filename": "linux-perf-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:18+00:00", "updated_at": "2021-03-21T07:40:18+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d7bd60d94cd4b54afd18077158e50078eee33530ba0ad172cae58ea0caafdbbe", "name": "linux-perf-4.19", "version": "4.19.152-1", "filename": "linux-perf-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:20+00:00", "updated_at": "2021-03-21T07:40:20+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d7bd60d94cd4b54afd18077158e50078eee33530ba0ad172cae58ea0caafdbbe", "name": "linux-perf-4.19", "version": "4.19.152-1", "filename": "linux-perf-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:22+00:00", "updated_at": "2021-03-21T07:40:22+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "d7bd60d94cd4b54afd18077158e50078eee33530ba0ad172cae58ea0caafdbbe", "name": "linux-perf-4.19", "version": "4.19.152-1", "filename": "linux-perf-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-21T07:40:23+00:00", "updated_at": "2021-03-21T07:40:23+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T10:57:06+00:00", "updated_at": "2021-03-21T10:57:06+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T10:57:08+00:00", "updated_at": "2021-03-21T10:57:08+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T10:57:10+00:00", "updated_at": "2021-03-21T10:57:10+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T10:57:12+00:00", "updated_at": "2021-03-21T10:57:12+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "f32447969dfe0cea12802828b150bda2f402fbf20dccaff4632002f8b235c99f", "name": "linux-kbuild-4.19-dbgsym", "version": "4.19.152-1", "filename": "linux-kbuild-4.19-dbgsym_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T10:57:13+00:00", "updated_at": "2021-03-21T10:57:13+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2020-09-18T21:23:42+00:00", "updated_at": "2021-03-09T01:47:24+00:00", "deleted_at": null }