Raw Object
{
"sha256": "70a31211a94a7b09122456825576f81f2b1a531cb25c3cf2cf42a9b3d85860e3",
"sha1": "3616cf47767700afbe7520035ac4b6a9f1553264",
"md5": "d2c1f7883358df943fdfdfac84b690ed",
"type": "DEB",
"arch": "ALL",
"name": "linux-gkeop-source-5.4.0",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1054.57_all.deb",
"size": 288,
"description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
"url": null,
"version": "5.4.0-1054.57",
"source": "linux-gkeop",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "binutils, bzip2, coreutils",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2022-42720",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1056.60",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
},
"created_at": "2022-10-20T17:16:57+00:00",
"updated_at": "2022-10-20T17:16:57+00:00"
},
{
"name": "CVE-2022-42721",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1056.60",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
},
"created_at": "2022-10-20T18:10:45+00:00",
"updated_at": "2022-10-20T18:10:45+00:00"
},
{
"name": "CVE-2022-41674",
"risk": 81,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1056.60",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
},
"created_at": "2022-10-20T18:33:23+00:00",
"updated_at": "2022-10-20T18:33:23+00:00"
},
{
"name": "CVE-2022-2602",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1056.60",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb"
},
"created_at": "2022-10-20T19:23:46+00:00",
"updated_at": "2022-10-20T19:23:46+00:00"
},
{
"name": "CVE-2022-29901",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:06:20+00:00",
"updated_at": "2022-11-21T11:06:20+00:00"
},
{
"name": "CVE-2022-2153",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:10:06+00:00",
"updated_at": "2022-11-21T11:10:06+00:00"
},
{
"name": "CVE-2022-40768",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:11:14+00:00",
"updated_at": "2022-11-21T11:11:14+00:00"
},
{
"name": "CVE-2022-41222",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:28:41+00:00",
"updated_at": "2022-11-21T11:28:41+00:00"
},
{
"name": "CVE-2022-2978",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:29:02+00:00",
"updated_at": "2022-11-21T11:29:02+00:00"
},
{
"name": "CVE-2022-3625",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:29:31+00:00",
"updated_at": "2022-11-21T11:29:31+00:00"
},
{
"name": "CVE-2022-20422",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:29:55+00:00",
"updated_at": "2022-11-21T11:29:55+00:00"
},
{
"name": "CVE-2022-42703",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:30:15+00:00",
"updated_at": "2022-11-21T11:30:15+00:00"
},
{
"name": "CVE-2022-3635",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:30:34+00:00",
"updated_at": "2022-11-21T11:30:34+00:00"
},
{
"name": "CVE-2022-39188",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:30:46+00:00",
"updated_at": "2022-11-21T11:30:46+00:00"
},
{
"name": "CVE-2022-42719",
"risk": 88,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-21T11:31:00+00:00",
"updated_at": "2022-11-21T11:31:00+00:00"
},
{
"name": "CVE-2022-3028",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2022-11-22T10:38:25+00:00",
"updated_at": "2022-11-22T10:38:25+00:00"
},
{
"name": "CVE-2022-3633",
"risk": 3,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2023-04-21T09:27:47+00:00",
"updated_at": "2023-04-21T09:27:47+00:00"
},
{
"name": "CVE-2022-3629",
"risk": 3,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2023-04-21T09:28:29+00:00",
"updated_at": "2023-04-21T09:28:29+00:00"
},
{
"name": "CVE-2023-1095",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2023-04-21T09:31:07+00:00",
"updated_at": "2023-04-21T09:31:07+00:00"
},
{
"name": "CVE-2023-2513",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1057.61",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
},
"created_at": "2023-06-06T10:18:58+00:00",
"updated_at": "2023-06-06T10:18:58+00:00"
}
],
"risk": 88,
"vulnerable": 88,
"outdated": 88,
"malicious": 0,
"created_at": "2022-10-05T10:29:01+00:00",
"updated_at": "2022-10-06T17:10:59+00:00",
"deleted_at": null
}