Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (9)

linux-doc

Hashes
Linux kernel specific documentation for version 4.4.0 This package provides the various documents in the 4.4.0 kernel Documentation/ subdirectory. These document kernel subsystems, APIs, device drivers, and so on. See /usr/share/doc/linux-doc/00-INDEX for a list of what is contained in each file.
  • SHA256: 4cf99e59a277bbc2607a0afeec21d4680eb8bca545be32cbd86bff5aa5efe865
  • SHA1: 83a32c7bd423a6c3de1ffee648f165ba523e9492
  • MD5: 28f7d4e716dfb5208e9a866dcffbdc78
Information
  • Version: 4.4.0-157.185
  • Filename: linux-doc_4.4.0-157.185_all.deb
  • Size: 42694
  • Type: DEB
  • Source: linux
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>

Vulnerabilities

NameRiskSourceFixed
CVE-2019-1580747USN
linux-doc
4.4.0-159.187
CVE-2019-1012698USN
linux-doc
4.4.0-159.187
CVE-2018-538368USN
linux-doc
4.4.0-159.187
CVE-2019-1159970USN
linux-doc
4.4.0-159.187
CVE-2019-1327278USN
linux-doc
4.4.0-159.187
CVE-2019-1261447USN
linux-doc
4.4.0-159.187
CVE-2019-950681USN
linux-doc
4.4.0-159.187
CVE-2019-112555USN
linux-doc
4.4.0-159.187
CVE-2019-384688USN
linux-doc
4.4.0-159.187

Raw Object

{
  "sha256": "4cf99e59a277bbc2607a0afeec21d4680eb8bca545be32cbd86bff5aa5efe865",
  "sha1": "83a32c7bd423a6c3de1ffee648f165ba523e9492",
  "md5": "28f7d4e716dfb5208e9a866dcffbdc78",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-doc",
  "filename": "linux-doc_4.4.0-157.185_all.deb",
  "size": 42694,
  "description": "Linux kernel specific documentation for version 4.4.0\nThis package provides the various documents in the 4.4.0 kernel\nDocumentation/ subdirectory.  These document kernel subsystems, APIs, device\ndrivers, and so on.  See\n/usr/share/doc/linux-doc/00-INDEX for a list of what is\ncontained in each file.",
  "url": null,
  "version": "4.4.0-157.185",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": null,
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2019-15807",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T04:27:03+00:00",
      "updated_at": "2021-03-22T04:27:03+00:00"
    },
    {
      "name": "CVE-2019-10126",
      "risk": 98,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T05:20:09+00:00",
      "updated_at": "2021-06-30T01:39:04+00:00"
    },
    {
      "name": "CVE-2018-5383",
      "risk": 68,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T05:52:30+00:00",
      "updated_at": "2021-06-30T03:01:34+00:00"
    },
    {
      "name": "CVE-2019-11599",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T05:15:05+00:00",
      "updated_at": "2021-06-29T22:17:35+00:00"
    },
    {
      "name": "CVE-2019-13272",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T05:25:27+00:00",
      "updated_at": "2021-06-29T23:49:56+00:00"
    },
    {
      "name": "CVE-2019-12614",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T04:36:18+00:00",
      "updated_at": "2021-06-30T03:17:16+00:00"
    },
    {
      "name": "CVE-2019-9506",
      "risk": 81,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T05:24:20+00:00",
      "updated_at": "2021-06-30T03:43:28+00:00"
    },
    {
      "name": "CVE-2019-1125",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T05:15:56+00:00",
      "updated_at": "2021-06-30T03:55:13+00:00"
    },
    {
      "name": "CVE-2019-3846",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bcb0634b27272350df3af2227bd36bd96e72bb3d236849227ca5a0c54a445f44",
        "name": "linux-doc",
        "version": "4.4.0-159.187",
        "filename": "linux-doc_4.4.0-159.187_all.deb"
      },
      "created_at": "2021-03-22T05:31:15+00:00",
      "updated_at": "2021-06-30T04:37:07+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-07-23T13:02:11+00:00",
  "updated_at": "2021-03-20T15:34:05+00:00",
  "deleted_at": null
}