967baf05cc23522b8d50d750ca1d2135829bd7d00043e9aae385cea303ddfa40
af4ff53d03d978faeb20f6ef74c905e7c54983ef
23d27d91f4e68a507e4ad68ea7049bc9
5.4.0-137.154
linux-source-5.4.0_5.4.0-137.154_all.deb
149183
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
fix-filenames /usr/src/linux-source-5.4.0/debian/scripts/fix-filenames | 17256 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-source-5.4.0 5.4.0-139.156 |
CVE-2022-3640 | 9 | USN | linux-source-5.4.0 5.4.0-139.156 |
CVE-2022-42895 | 6 | USN | linux-source-5.4.0 5.4.0-139.156 |
CVE-2022-41850 | 47 | USN | linux-source-5.4.0 5.4.0-139.156 |
CVE-2022-3649 | 10 | USN | linux-source-5.4.0 5.4.0-139.156 |
CVE-2022-41849 | 42 | USN | linux-source-5.4.0 5.4.0-139.156 |
CVE-2023-20928 | 8 | USN | linux-source-5.4.0 5.4.0-139.156 |
CVE-2023-1829 | 8 | USN | linux-source-5.4.0 5.4.0-148.165 |
CVE-2023-3812 | 0 | USN | linux-source-5.4.0 5.4.0-139.156 |
{ "sha256": "967baf05cc23522b8d50d750ca1d2135829bd7d00043e9aae385cea303ddfa40", "sha1": "af4ff53d03d978faeb20f6ef74c905e7c54983ef", "md5": "23d27d91f4e68a507e4ad68ea7049bc9", "type": "DEB", "arch": "ALL", "name": "linux-source-5.4.0", "filename": "linux-source-5.4.0_5.4.0-137.154_all.deb", "size": 149183, "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.", "url": null, "version": "5.4.0-137.154", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [ { "path": "/usr/src/linux-source-5.4.0/debian/scripts/fix-filenames", "sha256": "ee5ff016a3a07acc5513a32515f81024535a47aad435eb1859a18e46ab344fa3", "sha1": "1eb70ff16d69a3de2db0e622c1ef6fd81855a4de", "md5": "be0d473dc6c8f1b0a77bc23426bc39a5", "name": "fix-filenames", "size": 17256, "description": null, "package": 5052840, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-14T10:13:32+00:00", "updated_at": "2023-01-14T10:13:32+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-02-10T10:16:46+00:00", "updated_at": "2023-02-10T10:16:46+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-02-10T10:30:05+00:00", "updated_at": "2023-02-10T10:30:05+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-02-10T10:31:24+00:00", "updated_at": "2023-02-10T10:31:24+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-02-10T10:34:56+00:00", "updated_at": "2023-02-10T10:34:56+00:00" }, { "name": "CVE-2022-3649", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-02-10T10:36:28+00:00", "updated_at": "2023-02-10T10:36:28+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-02-10T10:41:10+00:00", "updated_at": "2023-02-10T10:41:10+00:00" }, { "name": "CVE-2023-20928", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-02-17T12:19:49+00:00", "updated_at": "2023-02-17T12:19:49+00:00" }, { "name": "CVE-2023-1829", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "e2665679884b8d2eb698e6b7707c5a4bb6524d52eb7201fcc9aefa2d053deed0", "name": "linux-source-5.4.0", "version": "5.4.0-148.165", "filename": "linux-source-5.4.0_5.4.0-148.165_all.deb" }, "created_at": "2023-04-29T07:29:10+00:00", "updated_at": "2023-04-29T07:29:10+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "9870f4fe6c193e59f7078fe908069ab4f24927149c4406adf4849deecd580f8d", "name": "linux-source-5.4.0", "version": "5.4.0-139.156", "filename": "linux-source-5.4.0_5.4.0-139.156_all.deb" }, "created_at": "2023-08-09T09:32:56+00:00", "updated_at": "2023-08-09T09:32:56+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 98, "malicious": 0, "created_at": "2023-01-05T19:16:08+00:00", "updated_at": "2023-01-14T10:13:30+00:00", "deleted_at": null }