Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (15)

linux-gkeop-source-5.4.0

Hashes
Linux kernel source for version 5.4.0 with Ubuntu patches This package provides the source code for the Linux kernel version 5.4.0. This package is mainly meant for other packages to use, in order to build custom flavours. If you wish to use this package to create a custom Linux kernel, then it is suggested that you investigate the package kernel-package, which has been designed to ease the task of creating kernel image packages. If you are simply trying to build third-party modules for your kernel, you do not want this package. Install the appropriate linux-gkeop-headers package instead.
  • SHA256: 8dbd221f328d10a4d09192c9ac7e8a3dfbec5d8a37c17db3ff2261b4a15d51cf
  • SHA1: 255f6a5943eee51bd452460c37b08c3dc4ba021a
  • MD5: 4df90a8f86c999bcfbd7f5bfa32ffc1e
Information
  • Version: 5.4.0-1052.55
  • Filename: linux-gkeop-source-5.4.0_5.4.0-1052.55_all.deb
  • Size: 264
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils, bzip2, coreutils

Vulnerabilities

NameRiskSourceFixed
CVE-2022-101291USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-3694675USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-322960USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-250367USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2021-3365578USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-172970USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-357778USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-205727USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-31156USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2023-18387USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2022-197441USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2023-20080USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2023-43877USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2023-44596USN
linux-gkeop-source-5.4.0
5.4.0-1053.56
CVE-2023-43856USN
linux-gkeop-source-5.4.0
5.4.0-1053.56

Raw Object

{
  "sha256": "8dbd221f328d10a4d09192c9ac7e8a3dfbec5d8a37c17db3ff2261b4a15d51cf",
  "sha1": "255f6a5943eee51bd452460c37b08c3dc4ba021a",
  "md5": "4df90a8f86c999bcfbd7f5bfa32ffc1e",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-gkeop-source-5.4.0",
  "filename": "linux-gkeop-source-5.4.0_5.4.0-1052.55_all.deb",
  "size": 264,
  "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
  "url": null,
  "version": "5.4.0-1052.55",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils, bzip2, coreutils",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2022-09-21T16:56:37+00:00",
      "updated_at": "2022-09-21T16:56:37+00:00"
    },
    {
      "name": "CVE-2022-36946",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2022-09-21T17:03:35+00:00",
      "updated_at": "2022-09-21T17:03:35+00:00"
    },
    {
      "name": "CVE-2022-32296",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2022-09-21T17:04:21+00:00",
      "updated_at": "2022-09-21T17:04:21+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2022-09-21T17:04:54+00:00",
      "updated_at": "2022-09-21T17:04:54+00:00"
    },
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2022-09-21T17:07:42+00:00",
      "updated_at": "2022-09-21T17:07:42+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2022-09-21T17:08:34+00:00",
      "updated_at": "2022-09-21T17:08:34+00:00"
    },
    {
      "name": "CVE-2022-3577",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-02-18T11:25:28+00:00",
      "updated_at": "2023-02-18T11:25:28+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-03-07T11:46:33+00:00",
      "updated_at": "2023-03-07T11:46:33+00:00"
    },
    {
      "name": "CVE-2022-3115",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-03-07T12:09:23+00:00",
      "updated_at": "2023-03-07T12:09:23+00:00"
    },
    {
      "name": "CVE-2023-1838",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-04-21T09:27:17+00:00",
      "updated_at": "2023-04-21T09:27:17+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-04-21T09:33:08+00:00",
      "updated_at": "2023-04-21T09:33:08+00:00"
    },
    {
      "name": "CVE-2023-2008",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-05-13T10:47:35+00:00",
      "updated_at": "2023-05-13T10:47:35+00:00"
    },
    {
      "name": "CVE-2023-4387",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-09-13T09:51:05+00:00",
      "updated_at": "2023-09-13T09:51:05+00:00"
    },
    {
      "name": "CVE-2023-4459",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-09-13T10:29:10+00:00",
      "updated_at": "2023-09-13T10:29:10+00:00"
    },
    {
      "name": "CVE-2023-4385",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1053.56",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb"
      },
      "created_at": "2023-09-13T10:59:50+00:00",
      "updated_at": "2023-09-13T10:59:50+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-08-22T06:40:12+00:00",
  "updated_at": "2022-08-23T03:27:11+00:00",
  "deleted_at": null
}