Raw Object
{
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"sha1": "20c4d4735bfa55c470086b43706c979fa91a111d",
"md5": "d9321e4a10341a65c38c4a334072dd8b",
"type": "DEB",
"arch": "ALL",
"name": "linux-gkeop-source-5.4.0",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb",
"size": 300,
"description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
"url": null,
"version": "5.4.0-1057.61",
"source": "linux-gkeop",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "binutils, bzip2, coreutils",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2022-3594",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1060.64",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb"
},
"created_at": "2022-12-02T12:33:11+00:00",
"updated_at": "2022-12-02T12:33:11+00:00"
},
{
"name": "CVE-2022-3566",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1060.64",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb"
},
"created_at": "2022-12-02T12:41:58+00:00",
"updated_at": "2022-12-02T12:41:58+00:00"
},
{
"name": "CVE-2022-3564",
"risk": 80,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1060.64",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb"
},
"created_at": "2022-12-02T12:42:45+00:00",
"updated_at": "2022-12-02T12:42:45+00:00"
},
{
"name": "CVE-2022-3567",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1060.64",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb"
},
"created_at": "2022-12-02T12:43:31+00:00",
"updated_at": "2022-12-02T12:43:31+00:00"
},
{
"name": "CVE-2022-3621",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1060.64",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb"
},
"created_at": "2022-12-02T12:44:33+00:00",
"updated_at": "2022-12-02T12:44:33+00:00"
},
{
"name": "CVE-2022-3524",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1060.64",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb"
},
"created_at": "2022-12-02T12:46:00+00:00",
"updated_at": "2022-12-02T12:46:00+00:00"
},
{
"name": "CVE-2022-3565",
"risk": 80,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1060.64",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb"
},
"created_at": "2022-12-02T12:46:40+00:00",
"updated_at": "2022-12-02T12:46:40+00:00"
},
{
"name": "CVE-2022-2663",
"risk": 53,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T12:00:45+00:00",
"updated_at": "2023-01-07T12:00:45+00:00"
},
{
"name": "CVE-2022-3646",
"risk": 5,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T12:24:09+00:00",
"updated_at": "2023-01-07T12:24:09+00:00"
},
{
"name": "CVE-2022-3061",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T13:03:09+00:00",
"updated_at": "2023-01-07T13:03:09+00:00"
},
{
"name": "CVE-2022-3586",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T14:23:23+00:00",
"updated_at": "2023-01-07T14:23:23+00:00"
},
{
"name": "CVE-2022-43750",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T14:47:36+00:00",
"updated_at": "2023-01-07T14:47:36+00:00"
},
{
"name": "CVE-2022-20421",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T14:50:14+00:00",
"updated_at": "2023-01-07T14:50:14+00:00"
},
{
"name": "CVE-2022-40307",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:08:45+00:00",
"updated_at": "2023-01-07T15:08:45+00:00"
},
{
"name": "CVE-2022-39842",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:34:32+00:00",
"updated_at": "2023-01-07T15:34:32+00:00"
},
{
"name": "CVE-2022-3303",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:37:07+00:00",
"updated_at": "2023-01-07T15:37:07+00:00"
},
{
"name": "CVE-2022-4095",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:37:38+00:00",
"updated_at": "2023-01-07T15:37:38+00:00"
},
{
"name": "CVE-2022-4662",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-02-18T11:46:10+00:00",
"updated_at": "2023-02-18T11:46:10+00:00"
},
{
"name": "CVE-2022-39188",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-04-01T10:40:53+00:00",
"updated_at": "2023-04-01T10:40:53+00:00"
},
{
"name": "CVE-2022-42432",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-04-21T09:24:16+00:00",
"updated_at": "2023-04-21T09:24:16+00:00"
},
{
"name": "CVE-2023-2860",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-07-12T10:07:55+00:00",
"updated_at": "2023-07-12T10:07:55+00:00"
}
],
"risk": 80,
"vulnerable": 80,
"outdated": 80,
"malicious": 0,
"created_at": "2022-10-31T08:33:26+00:00",
"updated_at": "2022-11-02T10:26:56+00:00",
"deleted_at": null
}