Zercurity data services
  • Summary
  • Applications (1)
  • Packages (0)
  • Vulnerabilities (20)

linux-source-5.4.0

Hashes
Linux kernel source for version 5.4.0 with Ubuntu patches This package provides the source code for the Linux kernel version 5.4.0. This package is mainly meant for other packages to use, in order to build custom flavours. If you wish to use this package to create a custom Linux kernel, then it is suggested that you investigate the package kernel-package, which has been designed to ease the task of creating kernel image packages. If you are simply trying to build third-party modules for your kernel, you do not want this package. Install the appropriate linux-headers package instead.
  • SHA256: 072b231542abb282dfddb83500350dddd1a11f231fa192692bc1424729a60366
  • SHA1: 5d9395fdc700be55cb57b3243ae4f2c5a2234bdc
  • MD5: 6ec8cfae05776c74afaf2aec7a90e651
Information
  • Version: 5.4.0-128.144
  • Filename: linux-source-5.4.0_5.4.0-128.144_all.deb
  • Size: 148936
  • Type: DEB
  • Source: linux
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils, bzip2, coreutils

Applications

NameTypeArchSizeRisk
fix-filenames
/usr/src/linux-source-5.4.0/debian/scripts/fix-filenames
172560

Vulnerabilities

NameRiskSourceFixed
CVE-2022-4272078USN
linux-source-5.4.0
5.4.0-131.147
CVE-2022-4272155USN
linux-source-5.4.0
5.4.0-131.147
CVE-2022-4167481USN
linux-source-5.4.0
5.4.0-131.147
CVE-2022-26020USN
linux-source-5.4.0
5.4.0-131.147
CVE-2022-3918847USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-36357USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-299010USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-297878USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-215355USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-4122247USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-4270355USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-2042270USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-302870USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-36258USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-4271988USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-4076855USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-36333USN
linux-source-5.4.0
5.4.0-132.148
CVE-2022-36293USN
linux-source-5.4.0
5.4.0-132.148
CVE-2023-10956USN
linux-source-5.4.0
5.4.0-132.148
CVE-2023-25137USN
linux-source-5.4.0
5.4.0-132.148

Raw Object

{
  "sha256": "072b231542abb282dfddb83500350dddd1a11f231fa192692bc1424729a60366",
  "sha1": "5d9395fdc700be55cb57b3243ae4f2c5a2234bdc",
  "md5": "6ec8cfae05776c74afaf2aec7a90e651",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-source-5.4.0",
  "filename": "linux-source-5.4.0_5.4.0-128.144_all.deb",
  "size": 148936,
  "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.",
  "url": null,
  "version": "5.4.0-128.144",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils, bzip2, coreutils",
  "applications": [
    {
      "path": "/usr/src/linux-source-5.4.0/debian/scripts/fix-filenames",
      "sha256": "ee5ff016a3a07acc5513a32515f81024535a47aad435eb1859a18e46ab344fa3",
      "sha1": "1eb70ff16d69a3de2db0e622c1ef6fd81855a4de",
      "md5": "be0d473dc6c8f1b0a77bc23426bc39a5",
      "name": "fix-filenames",
      "size": 17256,
      "description": null,
      "package": 4077673,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-09-23T18:01:06+00:00",
      "updated_at": "2022-09-23T18:01:06+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-42720",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4ce2547e756cf76f73e368a3ebc762fe162de9b46becd7a41c11555eb104435a",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-131.147",
        "filename": "linux-source-5.4.0_5.4.0-131.147_all.deb"
      },
      "created_at": "2022-10-20T17:07:54+00:00",
      "updated_at": "2022-10-20T17:07:54+00:00"
    },
    {
      "name": "CVE-2022-42721",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4ce2547e756cf76f73e368a3ebc762fe162de9b46becd7a41c11555eb104435a",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-131.147",
        "filename": "linux-source-5.4.0_5.4.0-131.147_all.deb"
      },
      "created_at": "2022-10-20T18:10:33+00:00",
      "updated_at": "2022-10-20T18:10:33+00:00"
    },
    {
      "name": "CVE-2022-41674",
      "risk": 81,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4ce2547e756cf76f73e368a3ebc762fe162de9b46becd7a41c11555eb104435a",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-131.147",
        "filename": "linux-source-5.4.0_5.4.0-131.147_all.deb"
      },
      "created_at": "2022-10-20T18:33:10+00:00",
      "updated_at": "2022-10-20T18:33:10+00:00"
    },
    {
      "name": "CVE-2022-2602",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4ce2547e756cf76f73e368a3ebc762fe162de9b46becd7a41c11555eb104435a",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-131.147",
        "filename": "linux-source-5.4.0_5.4.0-131.147_all.deb"
      },
      "created_at": "2022-10-20T19:23:31+00:00",
      "updated_at": "2022-10-20T19:23:31+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T10:37:00+00:00",
      "updated_at": "2022-11-17T10:37:00+00:00"
    },
    {
      "name": "CVE-2022-3635",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T10:41:57+00:00",
      "updated_at": "2022-11-17T10:41:57+00:00"
    },
    {
      "name": "CVE-2022-29901",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T10:48:44+00:00",
      "updated_at": "2022-11-17T10:48:44+00:00"
    },
    {
      "name": "CVE-2022-2978",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:02:34+00:00",
      "updated_at": "2022-11-17T11:02:34+00:00"
    },
    {
      "name": "CVE-2022-2153",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:03:04+00:00",
      "updated_at": "2022-11-17T11:03:04+00:00"
    },
    {
      "name": "CVE-2022-41222",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:03:23+00:00",
      "updated_at": "2022-11-17T11:03:23+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:03:35+00:00",
      "updated_at": "2022-11-17T11:03:35+00:00"
    },
    {
      "name": "CVE-2022-20422",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:03:51+00:00",
      "updated_at": "2022-11-17T11:03:51+00:00"
    },
    {
      "name": "CVE-2022-3028",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:04:25+00:00",
      "updated_at": "2022-11-17T11:04:25+00:00"
    },
    {
      "name": "CVE-2022-3625",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:07:45+00:00",
      "updated_at": "2022-11-17T11:07:45+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:08:06+00:00",
      "updated_at": "2022-11-17T11:08:06+00:00"
    },
    {
      "name": "CVE-2022-40768",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2022-11-17T11:08:54+00:00",
      "updated_at": "2022-11-17T11:08:54+00:00"
    },
    {
      "name": "CVE-2022-3633",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2023-04-21T09:27:38+00:00",
      "updated_at": "2023-04-21T09:27:38+00:00"
    },
    {
      "name": "CVE-2022-3629",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2023-04-21T09:28:18+00:00",
      "updated_at": "2023-04-21T09:28:18+00:00"
    },
    {
      "name": "CVE-2023-1095",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2023-04-21T09:30:57+00:00",
      "updated_at": "2023-04-21T09:30:57+00:00"
    },
    {
      "name": "CVE-2023-2513",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e6a8b680a13f2d5237ef501afdc04ebe8c7b6ac9186c4affe9278195f9226d4d",
        "name": "linux-source-5.4.0",
        "version": "5.4.0-132.148",
        "filename": "linux-source-5.4.0_5.4.0-132.148_all.deb"
      },
      "created_at": "2023-06-06T10:18:43+00:00",
      "updated_at": "2023-06-06T10:18:43+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-09-22T10:14:17+00:00",
  "updated_at": "2022-09-23T17:01:02+00:00",
  "deleted_at": null
}