8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409
2229874c91c3b870b75eca9d572dec93c8d2d546
27a3019bd2b542dbbd203a0c4a4421f1
5.4.0-1074.78
linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb
366
DEB
linux-gkeop
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-2002 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-35824 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-2269 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-31084 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-21255 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-2163 | 9 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-3268 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-35828 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-35823 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2023-34256 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2022-45886 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2022-45919 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
CVE-2022-45887 | 5 | USN | linux-gkeop-source-5.4.0 5.4.0-1076.80 |
{ "sha256": "8094617625770e8261fffd020d102197f854ecc2e26663c172f11a6225c2d409", "sha1": "2229874c91c3b870b75eca9d572dec93c8d2d546", "md5": "27a3019bd2b542dbbd203a0c4a4421f1", "type": "DEB", "arch": "ALL", "name": "linux-gkeop-source-5.4.0", "filename": "linux-gkeop-source-5.4.0_5.4.0-1074.78_all.deb", "size": 366, "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.", "url": null, "version": "5.4.0-1074.78", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [], "vulnerabilities": [ { "name": "CVE-2023-2002", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:46:02+00:00", "updated_at": "2023-09-09T09:46:02+00:00" }, { "name": "CVE-2023-35824", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:46:22+00:00", "updated_at": "2023-09-09T09:46:22+00:00" }, { "name": "CVE-2023-2269", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:47:36+00:00", "updated_at": "2023-09-09T09:47:36+00:00" }, { "name": "CVE-2023-31084", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:48:14+00:00", "updated_at": "2023-09-09T09:48:14+00:00" }, { "name": "CVE-2023-21255", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:48:35+00:00", "updated_at": "2023-09-09T09:48:35+00:00" }, { "name": "CVE-2023-2163", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:48:43+00:00", "updated_at": "2023-09-09T09:48:43+00:00" }, { "name": "CVE-2023-3268", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:49:03+00:00", "updated_at": "2023-09-09T09:49:03+00:00" }, { "name": "CVE-2023-35828", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:49:11+00:00", "updated_at": "2023-09-09T09:49:11+00:00" }, { "name": "CVE-2023-35823", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-09T09:50:16+00:00", "updated_at": "2023-09-09T09:50:16+00:00" }, { "name": "CVE-2023-34256", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-09-13T11:09:47+00:00", "updated_at": "2023-09-13T11:09:47+00:00" }, { "name": "CVE-2022-45886", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-10-07T14:26:59+00:00", "updated_at": "2023-10-07T14:26:59+00:00" }, { "name": "CVE-2022-45919", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-10-07T14:35:26+00:00", "updated_at": "2023-10-07T14:35:26+00:00" }, { "name": "CVE-2022-45887", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "a6d27c2ba79ef1f542c27595d9900f1b4dd6fb004c83b19e49448b76d535b071", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1076.80", "filename": "linux-gkeop-source-5.4.0_5.4.0-1076.80_all.deb" }, "created_at": "2023-10-07T16:35:23+00:00", "updated_at": "2023-10-07T16:35:23+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2023-07-26T10:42:19+00:00", "updated_at": "2023-07-28T09:18:14+00:00", "deleted_at": null }