158a0c53eb9e9d6e5071bebd68bba0e5b308608dad7870a1aa16e16020b5c1d3
60dea2ae06192e86614160d45e087b2e0de4f77b
f5126ecf59a380d861bfa981ead9ea99
5.15.0-58.64
linux-source-5.15.0_5.15.0-58.64_all.deb
166468
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
fix-filenames /usr/src/linux-source-5.15.0/debian/scripts/fix-filenames | 16448 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3543 | 55 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3623 | 8 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3640 | 9 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-42895 | 6 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-0590 | 5 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3619 | 43 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-41850 | 47 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-47940 | 8 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-41849 | 42 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-22998 | 6 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-1872 | 7 | USN | linux-source-5.15.0 5.15.0-71.78 |
CVE-2023-1829 | 8 | USN | linux-source-5.15.0 5.15.0-71.78 |
CVE-2022-1184 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-3006 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-3812 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
{ "sha256": "158a0c53eb9e9d6e5071bebd68bba0e5b308608dad7870a1aa16e16020b5c1d3", "sha1": "60dea2ae06192e86614160d45e087b2e0de4f77b", "md5": "f5126ecf59a380d861bfa981ead9ea99", "type": "DEB", "arch": "ALL", "name": "linux-source-5.15.0", "filename": "linux-source-5.15.0_5.15.0-58.64_all.deb", "size": 166468, "description": "Linux kernel source for version 5.15.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.15.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.", "url": null, "version": "5.15.0-58.64", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [ { "path": "/usr/src/linux-source-5.15.0/debian/scripts/fix-filenames", "sha256": "63c56e3592b046d0f59c7b9716cf08bf12a727b2bb598a3617b309e0bf8b158a", "sha1": "852721876082f55067447ed3c919b79ed1be378d", "md5": "aafc2cbbff3acc8461954a343135fa8a", "name": "fix-filenames", "size": 16448, "description": null, "package": 5052859, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:14:29+00:00", "updated_at": "2023-01-14T10:14:29+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:16:50+00:00", "updated_at": "2023-02-10T10:16:50+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:22:52+00:00", "updated_at": "2023-02-10T10:22:52+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:27:52+00:00", "updated_at": "2023-02-10T10:27:52+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:30:09+00:00", "updated_at": "2023-02-10T10:30:09+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:31:28+00:00", "updated_at": "2023-02-10T10:31:28+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:50+00:00", "updated_at": "2023-02-10T10:32:50+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:57+00:00", "updated_at": "2023-02-10T10:32:57+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:34:59+00:00", "updated_at": "2023-02-10T10:34:59+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:39:33+00:00", "updated_at": "2023-02-10T10:39:33+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:41:14+00:00", "updated_at": "2023-02-10T10:41:14+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-04-21T09:28:50+00:00", "updated_at": "2023-04-21T09:28:50+00:00" }, { "name": "CVE-2023-1872", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "71a6189c5ad1f5ee6b76759abae96a7ada4b68292f84eaaf4a6abf44b70726e1", "name": "linux-source-5.15.0", "version": "5.15.0-71.78", "filename": "linux-source-5.15.0_5.15.0-71.78_all.deb" }, "created_at": "2023-04-28T22:46:09+00:00", "updated_at": "2023-04-28T22:46:09+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "71a6189c5ad1f5ee6b76759abae96a7ada4b68292f84eaaf4a6abf44b70726e1", "name": "linux-source-5.15.0", "version": "5.15.0-71.78", "filename": "linux-source-5.15.0_5.15.0-71.78_all.deb" }, "created_at": "2023-04-29T07:29:12+00:00", "updated_at": "2023-04-29T07:29:12+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-06-06T10:06:15+00:00", "updated_at": "2023-06-06T10:06:15+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-07-12T10:06:59+00:00", "updated_at": "2023-07-12T10:06:59+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-08-09T09:33:00+00:00", "updated_at": "2023-08-09T09:33:00+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-05T13:03:23+00:00", "updated_at": "2023-01-14T10:14:28+00:00", "deleted_at": null }