8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818
c3507fd0238b1ae450c8f9866d9af0930b1b06ae
d623de8211504da42172092f646d8f48
5.4.0-1056.60
linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb
289
DEB
linux-gkeop
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-29901 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-2153 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-40768 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-41222 | 47 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-2978 | 78 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3625 | 8 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-20422 | 70 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-42703 | 55 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3635 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-39188 | 47 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-42719 | 88 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3028 | 70 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3633 | 3 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2022-3629 | 3 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2023-1095 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
CVE-2023-2513 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1057.61 |
{ "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818", "sha1": "c3507fd0238b1ae450c8f9866d9af0930b1b06ae", "md5": "d623de8211504da42172092f646d8f48", "type": "DEB", "arch": "ALL", "name": "linux-gkeop-source-5.4.0", "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb", "size": 289, "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.", "url": null, "version": "5.4.0-1056.60", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-29901", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:06:20+00:00", "updated_at": "2022-11-21T11:06:20+00:00" }, { "name": "CVE-2022-2153", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:10:06+00:00", "updated_at": "2022-11-21T11:10:06+00:00" }, { "name": "CVE-2022-40768", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:11:14+00:00", "updated_at": "2022-11-21T11:11:14+00:00" }, { "name": "CVE-2022-41222", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:28:40+00:00", "updated_at": "2022-11-21T11:28:40+00:00" }, { "name": "CVE-2022-2978", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:02+00:00", "updated_at": "2022-11-21T11:29:02+00:00" }, { "name": "CVE-2022-3625", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:31+00:00", "updated_at": "2022-11-21T11:29:31+00:00" }, { "name": "CVE-2022-20422", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:29:55+00:00", "updated_at": "2022-11-21T11:29:55+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:15+00:00", "updated_at": "2022-11-21T11:30:15+00:00" }, { "name": "CVE-2022-3635", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:34+00:00", "updated_at": "2022-11-21T11:30:34+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:30:45+00:00", "updated_at": "2022-11-21T11:30:45+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-21T11:31:00+00:00", "updated_at": "2022-11-21T11:31:00+00:00" }, { "name": "CVE-2022-3028", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2022-11-22T10:38:25+00:00", "updated_at": "2022-11-22T10:38:25+00:00" }, { "name": "CVE-2022-3633", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:27:47+00:00", "updated_at": "2023-04-21T09:27:47+00:00" }, { "name": "CVE-2022-3629", "risk": 3, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:28:29+00:00", "updated_at": "2023-04-21T09:28:29+00:00" }, { "name": "CVE-2023-1095", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-04-21T09:31:07+00:00", "updated_at": "2023-04-21T09:31:07+00:00" }, { "name": "CVE-2023-2513", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1057.61", "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb" }, "created_at": "2023-06-06T10:18:58+00:00", "updated_at": "2023-06-06T10:18:58+00:00" } ], "risk": 88, "vulnerable": 88, "outdated": 88, "malicious": 0, "created_at": "2022-10-18T19:09:21+00:00", "updated_at": "2022-10-19T16:39:05+00:00", "deleted_at": null }