17987af8203bf243ba504efe81e8b6886cbe58adfe62f96fe6a01fa9219a9078
74b0cbda63918d02b7237eb2a54d7d6e3cfc6bc3
3ea53e309be1b188905b6f7ef2704009
4.4.0-194.226
linux-source-4.4.0_4.4.0-194.226_all.deb
129291
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
fix-filenames /usr/src/linux-source-4.4.0/debian/scripts/fix-filenames | 9272 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2020-25705 | 74 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-25284 | 41 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-25211 | 60 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-14390 | 56 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-25645 | 75 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-28915 | 61 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-10135 | 54 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-0427 | 55 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-4788 | 47 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-12352 | 65 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-25643 | 75 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2020-14351 | 78 | USN | linux-source-4.4.0 4.4.0-197.229 |
CVE-2021-0448 | 0 | USN | linux-source-4.4.0 4.4.0-197.229 |
{ "sha256": "17987af8203bf243ba504efe81e8b6886cbe58adfe62f96fe6a01fa9219a9078", "sha1": "74b0cbda63918d02b7237eb2a54d7d6e3cfc6bc3", "md5": "3ea53e309be1b188905b6f7ef2704009", "type": "DEB", "arch": "ALL", "name": "linux-source-4.4.0", "filename": "linux-source-4.4.0_4.4.0-194.226_all.deb", "size": 129291, "description": "Linux kernel source for version 4.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n4.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.", "url": null, "version": "4.4.0-194.226", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [ { "path": "/usr/src/linux-source-4.4.0/debian/scripts/fix-filenames", "sha256": "7c7ba222cf8a090c216684c415ee6835f4e4889d580fab5a9888d2e1e69d00d7", "sha1": "e4c6c557db6c2a9e19059ee63ea9063073100b69", "md5": "8af42dbc4ce3c30100bda08f0a5d9fe0", "name": "fix-filenames", "size": 9272, "description": null, "package": 2071465, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-21T07:05:28+00:00", "updated_at": "2021-03-21T07:05:28+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2020-25705", "risk": 74, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T08:26:33+00:00", "updated_at": "2021-06-30T21:27:19+00:00" }, { "name": "CVE-2020-25284", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T08:33:26+00:00", "updated_at": "2021-06-30T22:12:21+00:00" }, { "name": "CVE-2020-25211", "risk": 60, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T08:45:51+00:00", "updated_at": "2021-06-30T22:45:30+00:00" }, { "name": "CVE-2020-14390", "risk": 56, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T09:28:05+00:00", "updated_at": "2021-06-30T21:36:14+00:00" }, { "name": "CVE-2020-25645", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T10:08:27+00:00", "updated_at": "2021-06-30T22:31:49+00:00" }, { "name": "CVE-2020-28915", "risk": 61, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T11:44:40+00:00", "updated_at": "2021-06-30T22:01:23+00:00" }, { "name": "CVE-2020-10135", "risk": 54, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T12:39:29+00:00", "updated_at": "2021-06-30T22:01:04+00:00" }, { "name": "CVE-2020-0427", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-22T04:48:56+00:00", "updated_at": "2021-06-29T22:22:22+00:00" }, { "name": "CVE-2020-4788", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-22T04:56:49+00:00", "updated_at": "2021-06-29T21:52:49+00:00" }, { "name": "CVE-2020-12352", "risk": 65, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T17:55:51+00:00", "updated_at": "2021-06-30T03:34:26+00:00" }, { "name": "CVE-2020-25643", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T12:17:25+00:00", "updated_at": "2021-06-30T21:57:29+00:00" }, { "name": "CVE-2020-14351", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-03-21T10:16:44+00:00", "updated_at": "2021-06-30T21:57:51+00:00" }, { "name": "CVE-2021-0448", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "9e97a38b8e792c1a5d73717f667133cfb9ffdc2e0f081f2a422dfea65788a501", "name": "linux-source-4.4.0", "version": "4.4.0-197.229", "filename": "linux-source-4.4.0_4.4.0-197.229_all.deb" }, "created_at": "2021-07-19T17:26:24+00:00", "updated_at": "2021-07-19T17:26:24+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 0, "malicious": 0, "created_at": "2020-10-21T13:38:09+00:00", "updated_at": "2021-03-21T07:05:27+00:00", "deleted_at": null }