f36ae8376454fdf1942cc2a3e091515395850b2a71499b78f10af0bdbd8e5f56
f7581d6f63900525861fa7631acc679cca135a58
8f368a47fc2b3fb57cdfcfb59b518cef
4.4.0-174.204
linux-doc_4.4.0-174.204_all.deb
42760
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-14416 | 47 | USN | linux-doc 4.4.0-176.206 |
CVE-2020-2732 | 68 | USN | linux-doc 4.4.0-176.206 |
{ "sha256": "f36ae8376454fdf1942cc2a3e091515395850b2a71499b78f10af0bdbd8e5f56", "sha1": "f7581d6f63900525861fa7631acc679cca135a58", "md5": "8f368a47fc2b3fb57cdfcfb59b518cef", "type": "DEB", "arch": "ALL", "name": "linux-doc", "filename": "linux-doc_4.4.0-174.204_all.deb", "size": 42760, "description": "Linux kernel specific documentation for version 4.4.0\nThis package provides the various documents in the 4.4.0 kernel\nDocumentation/ subdirectory. These document kernel subsystems, APIs, device\ndrivers, and so on. See\n/usr/share/doc/linux-doc/00-INDEX for a list of what is\ncontained in each file.", "url": null, "version": "4.4.0-174.204", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": null, "applications": [], "vulnerabilities": [ { "name": "CVE-2020-14416", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "f95643b14d6215150ddb95927b513d65d547a43ee350c8937fa448ad8036334d", "name": "linux-doc", "version": "4.4.0-176.206", "filename": "linux-doc_4.4.0-176.206_all.deb" }, "created_at": "2021-03-22T04:37:38+00:00", "updated_at": "2021-03-22T04:37:38+00:00" }, { "name": "CVE-2020-2732", "risk": 68, "source": "USN", "sid": null, "fixed": { "sha256": "f95643b14d6215150ddb95927b513d65d547a43ee350c8937fa448ad8036334d", "name": "linux-doc", "version": "4.4.0-176.206", "filename": "linux-doc_4.4.0-176.206_all.deb" }, "created_at": "2021-03-22T04:42:16+00:00", "updated_at": "2021-06-30T00:50:47+00:00" } ], "risk": 68, "vulnerable": 68, "outdated": 0, "malicious": 0, "created_at": "2020-01-29T09:35:11+00:00", "updated_at": "2021-03-21T01:20:26+00:00", "deleted_at": null }