Raw Object
{
"sha256": "6013955580a78d7f7979b32715a168ee020d970cd8843e4502507ae6584d73d6",
"sha1": "ca8b79251208203b14503bd16afcd1ef74956b99",
"md5": "e604cf80b77bda2e67e4dcc91d8c5aaa",
"type": "DEB",
"arch": "ALL",
"name": "linux-gkeop-source-5.4.0",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1060.64_all.deb",
"size": 301,
"description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
"url": null,
"version": "5.4.0-1060.64",
"source": "linux-gkeop",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "binutils, bzip2, coreutils",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2022-2663",
"risk": 53,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T12:00:45+00:00",
"updated_at": "2023-01-07T12:00:45+00:00"
},
{
"name": "CVE-2022-3646",
"risk": 5,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T12:24:09+00:00",
"updated_at": "2023-01-07T12:24:09+00:00"
},
{
"name": "CVE-2022-3061",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T13:03:09+00:00",
"updated_at": "2023-01-07T13:03:09+00:00"
},
{
"name": "CVE-2022-3586",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T14:23:23+00:00",
"updated_at": "2023-01-07T14:23:23+00:00"
},
{
"name": "CVE-2022-43750",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T14:47:36+00:00",
"updated_at": "2023-01-07T14:47:36+00:00"
},
{
"name": "CVE-2022-20421",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T14:50:14+00:00",
"updated_at": "2023-01-07T14:50:14+00:00"
},
{
"name": "CVE-2022-40307",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:08:45+00:00",
"updated_at": "2023-01-07T15:08:45+00:00"
},
{
"name": "CVE-2022-39842",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:34:32+00:00",
"updated_at": "2023-01-07T15:34:32+00:00"
},
{
"name": "CVE-2022-3303",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:37:07+00:00",
"updated_at": "2023-01-07T15:37:07+00:00"
},
{
"name": "CVE-2022-4095",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-01-07T15:37:38+00:00",
"updated_at": "2023-01-07T15:37:38+00:00"
},
{
"name": "CVE-2022-3643",
"risk": 10,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "fe7609af62983e18fbac5937a2c1710fdb180c55134695fc4b68f8eaacfa5a17",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1062.66",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1062.66_all.deb"
},
"created_at": "2023-01-20T11:32:53+00:00",
"updated_at": "2023-01-20T11:32:53+00:00"
},
{
"name": "CVE-2022-45934",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "fe7609af62983e18fbac5937a2c1710fdb180c55134695fc4b68f8eaacfa5a17",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1062.66",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1062.66_all.deb"
},
"created_at": "2023-01-20T11:35:11+00:00",
"updated_at": "2023-01-20T11:35:11+00:00"
},
{
"name": "CVE-2022-42896",
"risk": 9,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "fe7609af62983e18fbac5937a2c1710fdb180c55134695fc4b68f8eaacfa5a17",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1062.66",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1062.66_all.deb"
},
"created_at": "2023-01-20T11:37:29+00:00",
"updated_at": "2023-01-20T11:37:29+00:00"
},
{
"name": "CVE-2022-43945",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "fe7609af62983e18fbac5937a2c1710fdb180c55134695fc4b68f8eaacfa5a17",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1062.66",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1062.66_all.deb"
},
"created_at": "2023-01-20T11:37:47+00:00",
"updated_at": "2023-01-20T11:37:47+00:00"
},
{
"name": "CVE-2022-4662",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-02-18T11:46:10+00:00",
"updated_at": "2023-02-18T11:46:10+00:00"
},
{
"name": "CVE-2022-39188",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-04-01T10:40:53+00:00",
"updated_at": "2023-04-01T10:40:53+00:00"
},
{
"name": "CVE-2022-42432",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-04-21T09:24:16+00:00",
"updated_at": "2023-04-21T09:24:16+00:00"
},
{
"name": "CVE-2023-2860",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "630de529f515dd51acc38df218b6bae711fe7834d3c549e77381aa8a9e019390",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1061.65",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1061.65_all.deb"
},
"created_at": "2023-07-12T10:07:55+00:00",
"updated_at": "2023-07-12T10:07:55+00:00"
}
],
"risk": 100,
"vulnerable": 100,
"outdated": 100,
"malicious": 0,
"created_at": "2022-11-28T15:44:12+00:00",
"updated_at": "2022-12-02T10:34:26+00:00",
"deleted_at": null
}