Zercurity data services
  • Summary
  • Applications (1)
  • Packages (0)
  • Vulnerabilities (18)

linux-source-4.15.0

Hashes
Linux kernel source for version 4.15.0 with Ubuntu patches This package provides the source code for the Linux kernel version 4.15.0. This package is mainly meant for other packages to use, in order to build custom flavours. If you wish to use this package to create a custom Linux kernel, then it is suggested that you investigate the package kernel-package, which has been designed to ease the task of creating kernel image packages. If you are simply trying to build third-party modules for your kernel, you do not want this package. Install the appropriate linux-headers package instead.
  • SHA256: b3601c80025feec79df3c4c71a17715a27821dcff577ec16d743e3b55f1dfbac
  • SHA1: becb7761a7d2d5938b74d0d5f6ba50622e395bc1
  • MD5: 36aca6e3ca5544e26b2fd8184499f920
Information
  • Version: 4.15.0-190.201
  • Filename: linux-source-4.15.0_4.15.0-190.201_all.deb
  • Size: 143471
  • Type: DEB
  • Source: linux
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils, bzip2, coreutils

Applications

NameTypeArchSizeRisk
fix-filenames
/usr/src/linux-source-4.15.0/debian/scripts/fix-filenames
129520

Vulnerabilities

NameRiskSourceFixed
CVE-2022-339810USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-11950USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-25880USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-25860USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-197441USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-16790USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-17340USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-165278USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-04940USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-10480USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-349180USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-197555USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-172970USN
linux-source-4.15.0
4.15.0-191.202
CVE-2021-336560USN
linux-source-4.15.0
4.15.0-192.203
CVE-2022-250367USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-205727USN
linux-source-4.15.0
4.15.0-191.202
CVE-2022-197441USN
linux-source-4.15.0
4.15.0-192.203
CVE-2022-299167USN
linux-source-4.15.0
4.15.0-191.202

Raw Object

{
  "sha256": "b3601c80025feec79df3c4c71a17715a27821dcff577ec16d743e3b55f1dfbac",
  "sha1": "becb7761a7d2d5938b74d0d5f6ba50622e395bc1",
  "md5": "36aca6e3ca5544e26b2fd8184499f920",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-source-4.15.0",
  "filename": "linux-source-4.15.0_4.15.0-190.201_all.deb",
  "size": 143471,
  "description": "Linux kernel source for version 4.15.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n4.15.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.",
  "url": null,
  "version": "4.15.0-190.201",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils, bzip2, coreutils",
  "applications": [
    {
      "path": "/usr/src/linux-source-4.15.0/debian/scripts/fix-filenames",
      "sha256": "03c9f560cafab4f2b53375df1d3e02198bb63c3a0e444440b5678ac2e29d5438",
      "sha1": "1dbefd27dbf65251176aa8cd98ae3b159202ccf5",
      "md5": "c7dd180d77b8447906f3fdd91b236714",
      "name": "fix-filenames",
      "size": 12952,
      "description": null,
      "package": 3840373,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-14T03:15:57+00:00",
      "updated_at": "2022-07-14T03:15:57+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T02:49:41+00:00",
      "updated_at": "2022-08-11T02:49:41+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:00:07+00:00",
      "updated_at": "2022-08-11T03:00:07+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:02:02+00:00",
      "updated_at": "2022-08-11T03:02:02+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:15:53+00:00",
      "updated_at": "2022-08-11T03:15:53+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:16:54+00:00",
      "updated_at": "2022-08-11T03:16:54+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:24:13+00:00",
      "updated_at": "2022-08-11T03:24:13+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:26:49+00:00",
      "updated_at": "2022-08-11T03:26:49+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:29:23+00:00",
      "updated_at": "2022-08-11T03:29:23+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:31:21+00:00",
      "updated_at": "2022-08-11T03:31:21+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:39:12+00:00",
      "updated_at": "2022-08-11T03:39:12+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:41:24+00:00",
      "updated_at": "2022-08-11T03:41:24+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:45:51+00:00",
      "updated_at": "2022-08-11T03:45:51+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:56:10+00:00",
      "updated_at": "2022-08-11T03:56:10+00:00"
    },
    {
      "name": "CVE-2021-33656",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f49f186d149f7c3f5dbf7eeab5a8ffe7447531ce9d4b06d33a344863269e45a8",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-192.203",
        "filename": "linux-source-4.15.0_4.15.0-192.203_all.deb"
      },
      "created_at": "2022-09-02T04:46:48+00:00",
      "updated_at": "2022-09-02T04:46:48+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-01-29T13:12:05+00:00",
      "updated_at": "2023-01-29T13:12:05+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-03-07T11:46:14+00:00",
      "updated_at": "2023-03-07T11:46:14+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f49f186d149f7c3f5dbf7eeab5a8ffe7447531ce9d4b06d33a344863269e45a8",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-192.203",
        "filename": "linux-source-4.15.0_4.15.0-192.203_all.deb"
      },
      "created_at": "2023-04-21T09:32:57+00:00",
      "updated_at": "2023-04-21T09:32:57+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ad5e693418684487e3598bb9d5790b4b8fbf91e0c83cbeb42f66073451e05279",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-191.202",
        "filename": "linux-source-4.15.0_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-04-21T09:38:45+00:00",
      "updated_at": "2023-04-21T09:38:45+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-07-13T04:24:24+00:00",
  "updated_at": "2022-07-14T02:15:55+00:00",
  "deleted_at": null
}