Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (16)

linux-gkeop-source-5.4.0

Hashes
Linux kernel source for version 5.4.0 with Ubuntu patches This package provides the source code for the Linux kernel version 5.4.0. This package is mainly meant for other packages to use, in order to build custom flavours. If you wish to use this package to create a custom Linux kernel, then it is suggested that you investigate the package kernel-package, which has been designed to ease the task of creating kernel image packages. If you are simply trying to build third-party modules for your kernel, you do not want this package. Install the appropriate linux-gkeop-headers package instead.
  • SHA256: 7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9
  • SHA1: dedc06196cea6f087dd589ce08a01d77bf1a6363
  • MD5: f43b5ce3e4601031c63e35f01570c24d
Information
  • Version: 5.4.0-1071.75
  • Filename: linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb
  • Size: 358
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils, bzip2, coreutils

Vulnerabilities

NameRiskSourceFixed
CVE-2023-332030USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-21947USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-18556USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2022-276720USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-05905USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-21240USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-31118USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2020-366916USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2022-016844USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2022-11840USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-31417USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2022-42696USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-284667USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-19905USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-307720USN
linux-gkeop-source-5.4.0
5.4.0-1074.78
CVE-2023-16116USN
linux-gkeop-source-5.4.0
5.4.0-1074.78

Raw Object

{
  "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9",
  "sha1": "dedc06196cea6f087dd589ce08a01d77bf1a6363",
  "md5": "f43b5ce3e4601031c63e35f01570c24d",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-gkeop-source-5.4.0",
  "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb",
  "size": 358,
  "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
  "url": null,
  "version": "5.4.0-1071.75",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils, bzip2, coreutils",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2023-33203",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:17:58+00:00",
      "updated_at": "2023-08-12T10:17:58+00:00"
    },
    {
      "name": "CVE-2023-2194",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:18:52+00:00",
      "updated_at": "2023-08-12T10:18:52+00:00"
    },
    {
      "name": "CVE-2023-1855",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:18:56+00:00",
      "updated_at": "2023-08-12T10:18:56+00:00"
    },
    {
      "name": "CVE-2022-27672",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:21:30+00:00",
      "updated_at": "2023-08-12T10:21:30+00:00"
    },
    {
      "name": "CVE-2023-0590",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:21:40+00:00",
      "updated_at": "2023-08-12T10:21:40+00:00"
    },
    {
      "name": "CVE-2023-2124",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:21:52+00:00",
      "updated_at": "2023-08-12T10:21:52+00:00"
    },
    {
      "name": "CVE-2023-3111",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:22:23+00:00",
      "updated_at": "2023-08-12T10:22:23+00:00"
    },
    {
      "name": "CVE-2020-36691",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:22:28+00:00",
      "updated_at": "2023-08-12T10:22:28+00:00"
    },
    {
      "name": "CVE-2022-0168",
      "risk": 44,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:22:37+00:00",
      "updated_at": "2023-08-12T10:22:37+00:00"
    },
    {
      "name": "CVE-2022-1184",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:22:51+00:00",
      "updated_at": "2023-08-12T10:22:51+00:00"
    },
    {
      "name": "CVE-2023-3141",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:23:43+00:00",
      "updated_at": "2023-08-12T10:23:43+00:00"
    },
    {
      "name": "CVE-2022-4269",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:24:11+00:00",
      "updated_at": "2023-08-12T10:24:11+00:00"
    },
    {
      "name": "CVE-2023-28466",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:24:43+00:00",
      "updated_at": "2023-08-12T10:24:43+00:00"
    },
    {
      "name": "CVE-2023-1990",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:25:21+00:00",
      "updated_at": "2023-08-12T10:25:21+00:00"
    },
    {
      "name": "CVE-2023-30772",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:25:24+00:00",
      "updated_at": "2023-08-12T10:25:24+00:00"
    },
    {
      "name": "CVE-2023-1611",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1074.78",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb"
      },
      "created_at": "2023-08-12T10:25:49+00:00",
      "updated_at": "2023-08-12T10:25:49+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2023-06-04T10:36:25+00:00",
  "updated_at": "2023-06-24T10:07:26+00:00",
  "deleted_at": null
}