7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9
dedc06196cea6f087dd589ce08a01d77bf1a6363
f43b5ce3e4601031c63e35f01570c24d
5.4.0-1071.75
linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb
358
DEB
linux-gkeop
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-33203 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-2194 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-1855 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2022-27672 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-0590 | 5 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-2124 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-3111 | 8 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2020-36691 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2022-0168 | 44 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2022-1184 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-3141 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2022-4269 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-28466 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-1990 | 5 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-30772 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
CVE-2023-1611 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1074.78 |
{ "sha256": "7e9f5e7eca5f56d549e59cea60328807b7d86a1356c759afd4d13917ac9033b9", "sha1": "dedc06196cea6f087dd589ce08a01d77bf1a6363", "md5": "f43b5ce3e4601031c63e35f01570c24d", "type": "DEB", "arch": "ALL", "name": "linux-gkeop-source-5.4.0", "filename": "linux-gkeop-source-5.4.0_5.4.0-1071.75_all.deb", "size": 358, "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.", "url": null, "version": "5.4.0-1071.75", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [], "vulnerabilities": [ { "name": "CVE-2023-33203", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:17:58+00:00", "updated_at": "2023-08-12T10:17:58+00:00" }, { "name": "CVE-2023-2194", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:18:52+00:00", "updated_at": "2023-08-12T10:18:52+00:00" }, { "name": "CVE-2023-1855", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:18:56+00:00", "updated_at": "2023-08-12T10:18:56+00:00" }, { "name": "CVE-2022-27672", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:21:30+00:00", "updated_at": "2023-08-12T10:21:30+00:00" }, { "name": "CVE-2023-0590", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:21:40+00:00", "updated_at": "2023-08-12T10:21:40+00:00" }, { "name": "CVE-2023-2124", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:21:52+00:00", "updated_at": "2023-08-12T10:21:52+00:00" }, { "name": "CVE-2023-3111", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:22:23+00:00", "updated_at": "2023-08-12T10:22:23+00:00" }, { "name": "CVE-2020-36691", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:22:28+00:00", "updated_at": "2023-08-12T10:22:28+00:00" }, { "name": "CVE-2022-0168", "risk": 44, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:22:37+00:00", "updated_at": "2023-08-12T10:22:37+00:00" }, { "name": "CVE-2022-1184", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:22:51+00:00", "updated_at": "2023-08-12T10:22:51+00:00" }, { "name": "CVE-2023-3141", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:23:43+00:00", "updated_at": "2023-08-12T10:23:43+00:00" }, { "name": "CVE-2022-4269", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:24:11+00:00", "updated_at": "2023-08-12T10:24:11+00:00" }, { "name": "CVE-2023-28466", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:24:43+00:00", "updated_at": "2023-08-12T10:24:43+00:00" }, { "name": "CVE-2023-1990", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:25:21+00:00", "updated_at": "2023-08-12T10:25:21+00:00" }, { "name": "CVE-2023-30772", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:25:24+00:00", "updated_at": "2023-08-12T10:25:24+00:00" }, { "name": "CVE-2023-1611", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1074.78", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb" }, "created_at": "2023-08-12T10:25:49+00:00", "updated_at": "2023-08-12T10:25:49+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2023-06-04T10:36:25+00:00", "updated_at": "2023-06-24T10:07:26+00:00", "deleted_at": null }