c9ca38f78529c3b168e458572d061abc77c64fc8ef62701ea88ce7710f57b448
d55b909b9d84a85a54976e2c8daf5c6ff79f5db7
d9ce92e22f2bb0aea7072d2e74347a51
5.15.0-59.65
linux-source-5.15.0_5.15.0-59.65_all.deb
166698
DEB
linux
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
fix-filenames /usr/src/linux-source-5.15.0/debian/scripts/fix-filenames | 16448 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-3628 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3543 | 55 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3623 | 8 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3640 | 9 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-42895 | 6 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-0590 | 5 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-3619 | 43 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-41850 | 47 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-47940 | 8 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-41849 | 42 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-22998 | 6 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2022-1184 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-3006 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
CVE-2023-3812 | 0 | USN | linux-source-5.15.0 5.15.0-60.66 |
{ "sha256": "c9ca38f78529c3b168e458572d061abc77c64fc8ef62701ea88ce7710f57b448", "sha1": "d55b909b9d84a85a54976e2c8daf5c6ff79f5db7", "md5": "d9ce92e22f2bb0aea7072d2e74347a51", "type": "DEB", "arch": "ALL", "name": "linux-source-5.15.0", "filename": "linux-source-5.15.0_5.15.0-59.65_all.deb", "size": 166698, "description": "Linux kernel source for version 5.15.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.15.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.", "url": null, "version": "5.15.0-59.65", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [ { "path": "/usr/src/linux-source-5.15.0/debian/scripts/fix-filenames", "sha256": "63c56e3592b046d0f59c7b9716cf08bf12a727b2bb598a3617b309e0bf8b158a", "sha1": "852721876082f55067447ed3c919b79ed1be378d", "md5": "aafc2cbbff3acc8461954a343135fa8a", "name": "fix-filenames", "size": 16448, "description": null, "package": 5043378, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-01-11T11:55:59+00:00", "updated_at": "2023-01-11T11:55:59+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3628", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:16:51+00:00", "updated_at": "2023-02-10T10:16:51+00:00" }, { "name": "CVE-2022-3543", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:22:53+00:00", "updated_at": "2023-02-10T10:22:53+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:27:53+00:00", "updated_at": "2023-02-10T10:27:53+00:00" }, { "name": "CVE-2022-3640", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:30:10+00:00", "updated_at": "2023-02-10T10:30:10+00:00" }, { "name": "CVE-2022-42895", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:31:29+00:00", "updated_at": "2023-02-10T10:31:29+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:51+00:00", "updated_at": "2023-02-10T10:32:51+00:00" }, { "name": "CVE-2022-3619", "risk": 43, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:32:58+00:00", "updated_at": "2023-02-10T10:32:58+00:00" }, { "name": "CVE-2022-41850", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:35:00+00:00", "updated_at": "2023-02-10T10:35:00+00:00" }, { "name": "CVE-2022-47940", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:39:34+00:00", "updated_at": "2023-02-10T10:39:34+00:00" }, { "name": "CVE-2022-41849", "risk": 42, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-02-10T10:41:15+00:00", "updated_at": "2023-02-10T10:41:15+00:00" }, { "name": "CVE-2023-22998", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-04-21T09:28:51+00:00", "updated_at": "2023-04-21T09:28:51+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-06-06T10:06:15+00:00", "updated_at": "2023-06-06T10:06:15+00:00" }, { "name": "CVE-2023-3006", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-07-12T10:07:00+00:00", "updated_at": "2023-07-12T10:07:00+00:00" }, { "name": "CVE-2023-3812", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cc4d50bee0117b7d252ec35b169376ab13a7d33d6d1e57b8675584064bd47f98", "name": "linux-source-5.15.0", "version": "5.15.0-60.66", "filename": "linux-source-5.15.0_5.15.0-60.66_all.deb" }, "created_at": "2023-08-09T09:33:01+00:00", "updated_at": "2023-08-09T09:33:01+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-01-09T23:09:01+00:00", "updated_at": "2023-01-11T11:55:57+00:00", "deleted_at": null }