e83b3142ff3914baea7a38e8a85f9e4a9ce4da9c6fe26896a803f391d55bc22d
ec8411499d34a6fbabae83b093538b44d8ef3006
606e4b2c293a82e079c9a9b7db531778
4.19.146-1
linux-headers-4.19.0-11-rt-amd64_4.19.146-1_amd64.deb
5038
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-4.19.0-11-common-rt (= 4.19.146-1), linux-kbuild-4.19 (>= 4.19.146-1), linux-compiler-gcc-8-x86
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-12351 | 88 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | linux-config-4.19 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | libbpf4.19 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | libbpf4.19 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | libbpf4.19 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | libbpf4.19 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | libbpf4.19 4.19.152-1 |
CVE-2020-12351 | 88 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-12352 | 65 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25211 | 60 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25643 | 75 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
CVE-2020-25645 | 75 | DSA DSA-4774-1 | libcpupower-dev 4.19.152-1 |
{ "sha256": "e83b3142ff3914baea7a38e8a85f9e4a9ce4da9c6fe26896a803f391d55bc22d", "sha1": "ec8411499d34a6fbabae83b093538b44d8ef3006", "md5": "606e4b2c293a82e079c9a9b7db531778", "type": "DEB", "arch": "AMD64", "name": "linux-headers-4.19.0-11-rt-amd64", "filename": "linux-headers-4.19.0-11-rt-amd64_4.19.146-1_amd64.deb", "size": 5038, "description": "Header files for Linux 4.19.0-11-rt-amd64\nThis package provides the architecture-specific kernel header files for\nLinux kernel 4.19.0-11-rt-amd64, generally used for building out-of-tree\nkernel modules. These files are going to be installed into\n/usr/src/linux-headers-4.19.0-11-rt-amd64, and can be used for building\nmodules that load into the kernel provided by the\nlinux-image-4.19.0-11-rt-amd64 package.", "url": "https://www.kernel.org/", "version": "4.19.146-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-4.19.0-11-common-rt (= 4.19.146-1), linux-kbuild-4.19 (>= 4.19.146-1), linux-compiler-gcc-8-x86", "applications": [], "vulnerabilities": [ { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:39+00:00", "updated_at": "2021-03-09T07:31:39+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:31:50+00:00", "updated_at": "2021-03-09T07:31:50+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:00+00:00", "updated_at": "2021-03-09T07:32:00+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:08+00:00", "updated_at": "2021-03-09T07:32:08+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "e77609a13d13f6df9ed7324150f8a6e3790cbeda5c959b4637211a3dd57f5530", "name": "linux-config-4.19", "version": "4.19.152-1", "filename": "linux-config-4.19_4.19.152-1_i386.deb" }, "created_at": "2021-03-09T07:32:17+00:00", "updated_at": "2021-03-09T07:32:17+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "0b1681fa948533a93319989118c23338edabb430cb406d32200ffc09db0cf15c", "name": "libbpf4.19", "version": "4.19.152-1", "filename": "libbpf4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:15+00:00", "updated_at": "2021-03-21T07:40:15+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "0b1681fa948533a93319989118c23338edabb430cb406d32200ffc09db0cf15c", "name": "libbpf4.19", "version": "4.19.152-1", "filename": "libbpf4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:17+00:00", "updated_at": "2021-03-21T07:40:17+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "0b1681fa948533a93319989118c23338edabb430cb406d32200ffc09db0cf15c", "name": "libbpf4.19", "version": "4.19.152-1", "filename": "libbpf4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:19+00:00", "updated_at": "2021-03-21T07:40:19+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "0b1681fa948533a93319989118c23338edabb430cb406d32200ffc09db0cf15c", "name": "libbpf4.19", "version": "4.19.152-1", "filename": "libbpf4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:21+00:00", "updated_at": "2021-03-21T07:40:21+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "0b1681fa948533a93319989118c23338edabb430cb406d32200ffc09db0cf15c", "name": "libbpf4.19", "version": "4.19.152-1", "filename": "libbpf4.19_4.19.152-1_amd64.deb" }, "created_at": "2021-03-21T07:40:23+00:00", "updated_at": "2021-03-21T07:40:23+00:00" }, { "name": "CVE-2020-12351", "risk": 88, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "30d031638db4973bcadea113d355d1e3e7613a2a9014950a0baeb2e75a0f965a", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_amd64.deb" }, "created_at": "2021-07-18T20:22:20+00:00", "updated_at": "2021-07-18T20:22:20+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "30d031638db4973bcadea113d355d1e3e7613a2a9014950a0baeb2e75a0f965a", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_amd64.deb" }, "created_at": "2021-07-18T20:22:20+00:00", "updated_at": "2021-07-18T20:22:20+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "30d031638db4973bcadea113d355d1e3e7613a2a9014950a0baeb2e75a0f965a", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_amd64.deb" }, "created_at": "2021-07-18T20:22:21+00:00", "updated_at": "2021-07-18T20:22:21+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "30d031638db4973bcadea113d355d1e3e7613a2a9014950a0baeb2e75a0f965a", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_amd64.deb" }, "created_at": "2021-07-18T20:22:22+00:00", "updated_at": "2021-07-18T20:22:22+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "DSA", "sid": "DSA-4774-1", "fixed": { "sha256": "30d031638db4973bcadea113d355d1e3e7613a2a9014950a0baeb2e75a0f965a", "name": "libcpupower-dev", "version": "4.19.152-1", "filename": "libcpupower-dev_4.19.152-1_amd64.deb" }, "created_at": "2021-07-18T20:22:23+00:00", "updated_at": "2021-07-18T20:22:23+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2020-09-18T21:23:47+00:00", "updated_at": "2021-03-09T02:31:05+00:00", "deleted_at": null }