f2301c703efd08145134d7221c3150740fa489e1b2f3ac55e88b7491425a611e
7a5636f3dbdac386881cf35d349ee52520efaf06
c5602c2534d736682c11af9e8f25c7b8
4.15.0-39.42
linux-doc_4.15.0-39.42_all.deb
80217
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2018-6559 | 33 | USN | linux-doc 4.15.0-42.45 |
CVE-2018-18955 | 70 | USN | linux-doc 4.15.0-42.45 |
{ "sha256": "f2301c703efd08145134d7221c3150740fa489e1b2f3ac55e88b7491425a611e", "sha1": "7a5636f3dbdac386881cf35d349ee52520efaf06", "md5": "c5602c2534d736682c11af9e8f25c7b8", "type": "DEB", "arch": "ALL", "name": "linux-doc", "filename": "linux-doc_4.15.0-39.42_all.deb", "size": 80217, "description": "Linux kernel specific documentation for version 4.15.0\nThis package provides the various documents in the 4.15.0 kernel\nDocumentation/ subdirectory. These document kernel subsystems, APIs, device\ndrivers, and so on. See\n/usr/share/doc/linux-doc/00-INDEX for a list of what is\ncontained in each file.", "url": null, "version": "4.15.0-39.42", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2018-6559", "risk": 33, "source": "USN", "sid": null, "fixed": { "sha256": "1b0cca43b8f068818c191b1e1db9c220e3fd06c7048a56202b27af62c7f3ce3f", "name": "linux-doc", "version": "4.15.0-42.45", "filename": "linux-doc_4.15.0-42.45_all.deb" }, "created_at": "2021-03-22T06:24:27+00:00", "updated_at": "2021-06-29T22:47:06+00:00" }, { "name": "CVE-2018-18955", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "1b0cca43b8f068818c191b1e1db9c220e3fd06c7048a56202b27af62c7f3ce3f", "name": "linux-doc", "version": "4.15.0-42.45", "filename": "linux-doc_4.15.0-42.45_all.deb" }, "created_at": "2021-03-22T06:36:51+00:00", "updated_at": "2021-06-30T00:23:12+00:00" } ], "risk": 70, "vulnerable": 70, "outdated": 0, "malicious": 0, "created_at": "2018-10-24T02:17:09+00:00", "updated_at": "2021-03-20T12:34:41+00:00", "deleted_at": null }