39f869a3b74377537ccf113ab0df9bc7f7e4aa0bc25ad363399af55722fdf11b
3b76cd9e140e93faa1c86de84c70dcde19bee18b
987f9daed7ec2b207c4cfd7f045e6230
5.4.0-133.149
linux-source-5.4.0_5.4.0-133.149_all.deb
149046
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
fix-filenames /usr/src/linux-source-5.4.0/debian/scripts/fix-filenames | 17256 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2663 | 53 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-3646 | 5 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-3061 | 55 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-3586 | 55 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-43750 | 8 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-20421 | 78 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-40307 | 47 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-39842 | 78 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-3303 | 47 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-4095 | 8 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-4662 | 0 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-39188 | 47 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2022-42432 | 0 | USN | linux-source-5.4.0 5.4.0-136.153 |
CVE-2023-2860 | 0 | USN | linux-source-5.4.0 5.4.0-136.153 |
{ "sha256": "39f869a3b74377537ccf113ab0df9bc7f7e4aa0bc25ad363399af55722fdf11b", "sha1": "3b76cd9e140e93faa1c86de84c70dcde19bee18b", "md5": "987f9daed7ec2b207c4cfd7f045e6230", "type": "DEB", "arch": "ALL", "name": "linux-source-5.4.0", "filename": "linux-source-5.4.0_5.4.0-133.149_all.deb", "size": 149046, "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.", "url": null, "version": "5.4.0-133.149", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [ { "path": "/usr/src/linux-source-5.4.0/debian/scripts/fix-filenames", "sha256": "ee5ff016a3a07acc5513a32515f81024535a47aad435eb1859a18e46ab344fa3", "sha1": "1eb70ff16d69a3de2db0e622c1ef6fd81855a4de", "md5": "be0d473dc6c8f1b0a77bc23426bc39a5", "name": "fix-filenames", "size": 17256, "description": null, "package": 4910405, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-18T10:56:20+00:00", "updated_at": "2022-11-18T10:56:20+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2663", "risk": 53, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T11:58:19+00:00", "updated_at": "2023-01-07T11:58:19+00:00" }, { "name": "CVE-2022-3646", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T12:24:00+00:00", "updated_at": "2023-01-07T12:24:00+00:00" }, { "name": "CVE-2022-3061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T13:01:05+00:00", "updated_at": "2023-01-07T13:01:05+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T14:23:11+00:00", "updated_at": "2023-01-07T14:23:11+00:00" }, { "name": "CVE-2022-43750", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T14:47:28+00:00", "updated_at": "2023-01-07T14:47:28+00:00" }, { "name": "CVE-2022-20421", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T14:50:02+00:00", "updated_at": "2023-01-07T14:50:02+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T15:08:34+00:00", "updated_at": "2023-01-07T15:08:34+00:00" }, { "name": "CVE-2022-39842", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T15:34:24+00:00", "updated_at": "2023-01-07T15:34:24+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T15:36:59+00:00", "updated_at": "2023-01-07T15:36:59+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-01-07T15:37:26+00:00", "updated_at": "2023-01-07T15:37:26+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-02-18T11:46:00+00:00", "updated_at": "2023-02-18T11:46:00+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-04-01T10:40:39+00:00", "updated_at": "2023-04-01T10:40:39+00:00" }, { "name": "CVE-2022-42432", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-04-21T09:24:09+00:00", "updated_at": "2023-04-21T09:24:09+00:00" }, { "name": "CVE-2023-2860", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "936bef7911da820206ae8539eae8444aef431705d5841cdd1c70458d8cb4c71d", "name": "linux-source-5.4.0", "version": "5.4.0-136.153", "filename": "linux-source-5.4.0_5.4.0-136.153_all.deb" }, "created_at": "2023-07-12T10:07:43+00:00", "updated_at": "2023-07-12T10:07:43+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-11-16T15:05:22+00:00", "updated_at": "2022-11-18T10:56:16+00:00", "deleted_at": null }