f31abb39e1caa551ff496215461eb6a9b8bdfbf540ba6b950fb9485ddde37402
4bc869bb2a21912f1d03947d2f0fc5446e1df64c
9ceb6d80e448856d049f50d1de351c3b
4.19.67-2+deb10u1~bpo9+1
linux-headers-4.19.0-0.bpo.6-all-amd64_4.19.67-2+deb10u1~bpo9+1_amd64.deb
321
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
linux-headers-4.19.0-0.bpo.6-amd64 (= 4.19.67-2+deb10u1~bpo9+1), linux-headers-4.19.0-0.bpo.6-cloud-amd64 (= 4.19.67-2+deb10u1~bpo9+1), linux-headers-4.19.0-0.bpo.6-rt-amd64 (= 4.19.67-2+deb10u1~bpo9+1)
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-14821 | 88 | DSA DSA-4531-1 | liblockdep-dev 4.19.67-2+deb10u1 |
CVE-2019-14835 | 78 | DSA DSA-4531-1 | liblockdep-dev 4.19.67-2+deb10u1 |
CVE-2019-15117 | 78 | DSA DSA-4531-1 | liblockdep-dev 4.19.67-2+deb10u1 |
CVE-2019-15118 | 55 | DSA DSA-4531-1 | liblockdep-dev 4.19.67-2+deb10u1 |
CVE-2019-15902 | 56 | DSA DSA-4531-1 | liblockdep-dev 4.19.67-2+deb10u1 |
CVE-2019-14821 | 88 | DSA DSA-4531-1 | libbpf-dev 4.19.67-2+deb10u1 |
CVE-2019-14835 | 78 | DSA DSA-4531-1 | libbpf-dev 4.19.67-2+deb10u1 |
CVE-2019-15117 | 78 | DSA DSA-4531-1 | libbpf-dev 4.19.67-2+deb10u1 |
CVE-2019-15118 | 55 | DSA DSA-4531-1 | libbpf-dev 4.19.67-2+deb10u1 |
CVE-2019-15902 | 56 | DSA DSA-4531-1 | libbpf-dev 4.19.67-2+deb10u1 |
{ "sha256": "f31abb39e1caa551ff496215461eb6a9b8bdfbf540ba6b950fb9485ddde37402", "sha1": "4bc869bb2a21912f1d03947d2f0fc5446e1df64c", "md5": "9ceb6d80e448856d049f50d1de351c3b", "type": "DEB", "arch": "AMD64", "name": "linux-headers-4.19.0-0.bpo.6-all-amd64", "filename": "linux-headers-4.19.0-0.bpo.6-all-amd64_4.19.67-2+deb10u1~bpo9+1_amd64.deb", "size": 321, "description": "All header files for Linux 4.19 (meta-package)\nThis package depends against all architecture-specific kernel header files\nfor Linux kernel version 4.19, generally used for building out-of-tree\nkernel modules.", "url": "https://www.kernel.org/", "version": "4.19.67-2+deb10u1~bpo9+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "linux-headers-4.19.0-0.bpo.6-amd64 (= 4.19.67-2+deb10u1~bpo9+1), linux-headers-4.19.0-0.bpo.6-cloud-amd64 (= 4.19.67-2+deb10u1~bpo9+1), linux-headers-4.19.0-0.bpo.6-rt-amd64 (= 4.19.67-2+deb10u1~bpo9+1)", "applications": [], "vulnerabilities": [ { "name": "CVE-2019-14821", "risk": 88, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "6c359d8648fcad3e7332b88e263c63557b413261578354a5f44202a62d849474", "name": "liblockdep-dev", "version": "4.19.67-2+deb10u1", "filename": "liblockdep-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:46+00:00", "updated_at": "2021-03-08T10:01:46+00:00" }, { "name": "CVE-2019-14835", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "6c359d8648fcad3e7332b88e263c63557b413261578354a5f44202a62d849474", "name": "liblockdep-dev", "version": "4.19.67-2+deb10u1", "filename": "liblockdep-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:47+00:00", "updated_at": "2021-03-08T10:01:47+00:00" }, { "name": "CVE-2019-15117", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "6c359d8648fcad3e7332b88e263c63557b413261578354a5f44202a62d849474", "name": "liblockdep-dev", "version": "4.19.67-2+deb10u1", "filename": "liblockdep-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:47+00:00", "updated_at": "2021-03-08T10:01:47+00:00" }, { "name": "CVE-2019-15118", "risk": 55, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "6c359d8648fcad3e7332b88e263c63557b413261578354a5f44202a62d849474", "name": "liblockdep-dev", "version": "4.19.67-2+deb10u1", "filename": "liblockdep-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:48+00:00", "updated_at": "2021-03-08T10:01:48+00:00" }, { "name": "CVE-2019-15902", "risk": 56, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "6c359d8648fcad3e7332b88e263c63557b413261578354a5f44202a62d849474", "name": "liblockdep-dev", "version": "4.19.67-2+deb10u1", "filename": "liblockdep-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T10:01:49+00:00", "updated_at": "2021-03-08T10:01:49+00:00" }, { "name": "CVE-2019-14821", "risk": 88, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "b4257492ec8fa7ed3bb29a27fbc8a241a9dd99e3c38cd539f2a98bbf6ecff2a8", "name": "libbpf-dev", "version": "4.19.67-2+deb10u1", "filename": "libbpf-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T13:33:43+00:00", "updated_at": "2021-03-08T13:33:43+00:00" }, { "name": "CVE-2019-14835", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "b4257492ec8fa7ed3bb29a27fbc8a241a9dd99e3c38cd539f2a98bbf6ecff2a8", "name": "libbpf-dev", "version": "4.19.67-2+deb10u1", "filename": "libbpf-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T13:33:43+00:00", "updated_at": "2021-03-08T13:33:43+00:00" }, { "name": "CVE-2019-15117", "risk": 78, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "b4257492ec8fa7ed3bb29a27fbc8a241a9dd99e3c38cd539f2a98bbf6ecff2a8", "name": "libbpf-dev", "version": "4.19.67-2+deb10u1", "filename": "libbpf-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T13:33:44+00:00", "updated_at": "2021-03-08T13:33:44+00:00" }, { "name": "CVE-2019-15118", "risk": 55, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "b4257492ec8fa7ed3bb29a27fbc8a241a9dd99e3c38cd539f2a98bbf6ecff2a8", "name": "libbpf-dev", "version": "4.19.67-2+deb10u1", "filename": "libbpf-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T13:33:44+00:00", "updated_at": "2021-03-08T13:33:44+00:00" }, { "name": "CVE-2019-15902", "risk": 56, "source": "DSA", "sid": "DSA-4531-1", "fixed": { "sha256": "b4257492ec8fa7ed3bb29a27fbc8a241a9dd99e3c38cd539f2a98bbf6ecff2a8", "name": "libbpf-dev", "version": "4.19.67-2+deb10u1", "filename": "libbpf-dev_4.19.67-2+deb10u1_i386.deb" }, "created_at": "2021-03-08T13:33:45+00:00", "updated_at": "2021-03-08T13:33:45+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 0, "malicious": 0, "created_at": "2019-10-02T03:31:37+00:00", "updated_at": "2021-03-07T03:03:35+00:00", "deleted_at": null }