Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (16)

linux-gkeop-source-5.4.0

Hashes
Linux kernel source for version 5.4.0 with Ubuntu patches This package provides the source code for the Linux kernel version 5.4.0. This package is mainly meant for other packages to use, in order to build custom flavours. If you wish to use this package to create a custom Linux kernel, then it is suggested that you investigate the package kernel-package, which has been designed to ease the task of creating kernel image packages. If you are simply trying to build third-party modules for your kernel, you do not want this package. Install the appropriate linux-gkeop-headers package instead.
  • SHA256: 8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818
  • SHA1: c3507fd0238b1ae450c8f9866d9af0930b1b06ae
  • MD5: d623de8211504da42172092f646d8f48
Information
  • Version: 5.4.0-1056.60
  • Filename: linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb
  • Size: 289
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils, bzip2, coreutils

Vulnerabilities

NameRiskSourceFixed
CVE-2022-299010USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-215355USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4076855USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4122247USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-297878USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36258USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-2042270USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4270355USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36357USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-3918847USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-4271988USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-302870USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36333USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2022-36293USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2023-10956USN
linux-gkeop-source-5.4.0
5.4.0-1057.61
CVE-2023-25137USN
linux-gkeop-source-5.4.0
5.4.0-1057.61

Raw Object

{
  "sha256": "8b6887f1c6a6aaf9dbfebaedb755f1ae1213a230e8e5be5bbdd59990c5ccb818",
  "sha1": "c3507fd0238b1ae450c8f9866d9af0930b1b06ae",
  "md5": "d623de8211504da42172092f646d8f48",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-gkeop-source-5.4.0",
  "filename": "linux-gkeop-source-5.4.0_5.4.0-1056.60_all.deb",
  "size": 289,
  "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
  "url": null,
  "version": "5.4.0-1056.60",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils, bzip2, coreutils",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-29901",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:06:20+00:00",
      "updated_at": "2022-11-21T11:06:20+00:00"
    },
    {
      "name": "CVE-2022-2153",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:10:06+00:00",
      "updated_at": "2022-11-21T11:10:06+00:00"
    },
    {
      "name": "CVE-2022-40768",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:11:14+00:00",
      "updated_at": "2022-11-21T11:11:14+00:00"
    },
    {
      "name": "CVE-2022-41222",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:28:40+00:00",
      "updated_at": "2022-11-21T11:28:40+00:00"
    },
    {
      "name": "CVE-2022-2978",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:02+00:00",
      "updated_at": "2022-11-21T11:29:02+00:00"
    },
    {
      "name": "CVE-2022-3625",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:31+00:00",
      "updated_at": "2022-11-21T11:29:31+00:00"
    },
    {
      "name": "CVE-2022-20422",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:29:55+00:00",
      "updated_at": "2022-11-21T11:29:55+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:15+00:00",
      "updated_at": "2022-11-21T11:30:15+00:00"
    },
    {
      "name": "CVE-2022-3635",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:34+00:00",
      "updated_at": "2022-11-21T11:30:34+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:30:45+00:00",
      "updated_at": "2022-11-21T11:30:45+00:00"
    },
    {
      "name": "CVE-2022-42719",
      "risk": 88,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-21T11:31:00+00:00",
      "updated_at": "2022-11-21T11:31:00+00:00"
    },
    {
      "name": "CVE-2022-3028",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2022-11-22T10:38:25+00:00",
      "updated_at": "2022-11-22T10:38:25+00:00"
    },
    {
      "name": "CVE-2022-3633",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:27:47+00:00",
      "updated_at": "2023-04-21T09:27:47+00:00"
    },
    {
      "name": "CVE-2022-3629",
      "risk": 3,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:28:29+00:00",
      "updated_at": "2023-04-21T09:28:29+00:00"
    },
    {
      "name": "CVE-2023-1095",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-04-21T09:31:07+00:00",
      "updated_at": "2023-04-21T09:31:07+00:00"
    },
    {
      "name": "CVE-2023-2513",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "0b4f1e7a57b1a7f3b126c2291b3253491172670b4b871ee018e4cb2ccf251b8b",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1057.61",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1057.61_all.deb"
      },
      "created_at": "2023-06-06T10:18:58+00:00",
      "updated_at": "2023-06-06T10:18:58+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 88,
  "malicious": 0,
  "created_at": "2022-10-18T19:09:21+00:00",
  "updated_at": "2022-10-19T16:39:05+00:00",
  "deleted_at": null
}