8dbd221f328d10a4d09192c9ac7e8a3dfbec5d8a37c17db3ff2261b4a15d51cf
255f6a5943eee51bd452460c37b08c3dc4ba021a
4df90a8f86c999bcfbd7f5bfa32ffc1e
5.4.0-1052.55
linux-gkeop-source-5.4.0_5.4.0-1052.55_all.deb
264
DEB
linux-gkeop
ALL
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
binutils, bzip2, coreutils
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-1012 | 91 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-36946 | 75 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-32296 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-2503 | 67 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2021-33655 | 78 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-1729 | 70 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-3577 | 78 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-20572 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-3115 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2023-1838 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2022-1974 | 41 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2023-2008 | 0 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2023-4387 | 7 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2023-4459 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
CVE-2023-4385 | 6 | USN | linux-gkeop-source-5.4.0 5.4.0-1053.56 |
{ "sha256": "8dbd221f328d10a4d09192c9ac7e8a3dfbec5d8a37c17db3ff2261b4a15d51cf", "sha1": "255f6a5943eee51bd452460c37b08c3dc4ba021a", "md5": "4df90a8f86c999bcfbd7f5bfa32ffc1e", "type": "DEB", "arch": "ALL", "name": "linux-gkeop-source-5.4.0", "filename": "linux-gkeop-source-5.4.0_5.4.0-1052.55_all.deb", "size": 264, "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.", "url": null, "version": "5.4.0-1052.55", "source": "linux-gkeop", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "binutils, bzip2, coreutils", "applications": [], "vulnerabilities": [ { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2022-09-21T16:56:37+00:00", "updated_at": "2022-09-21T16:56:37+00:00" }, { "name": "CVE-2022-36946", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2022-09-21T17:03:35+00:00", "updated_at": "2022-09-21T17:03:35+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2022-09-21T17:04:21+00:00", "updated_at": "2022-09-21T17:04:21+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2022-09-21T17:04:54+00:00", "updated_at": "2022-09-21T17:04:54+00:00" }, { "name": "CVE-2021-33655", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2022-09-21T17:07:42+00:00", "updated_at": "2022-09-21T17:07:42+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2022-09-21T17:08:34+00:00", "updated_at": "2022-09-21T17:08:34+00:00" }, { "name": "CVE-2022-3577", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-02-18T11:25:28+00:00", "updated_at": "2023-02-18T11:25:28+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-03-07T11:46:33+00:00", "updated_at": "2023-03-07T11:46:33+00:00" }, { "name": "CVE-2022-3115", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-03-07T12:09:23+00:00", "updated_at": "2023-03-07T12:09:23+00:00" }, { "name": "CVE-2023-1838", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-04-21T09:27:17+00:00", "updated_at": "2023-04-21T09:27:17+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-04-21T09:33:08+00:00", "updated_at": "2023-04-21T09:33:08+00:00" }, { "name": "CVE-2023-2008", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-05-13T10:47:35+00:00", "updated_at": "2023-05-13T10:47:35+00:00" }, { "name": "CVE-2023-4387", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-09-13T09:51:05+00:00", "updated_at": "2023-09-13T09:51:05+00:00" }, { "name": "CVE-2023-4459", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-09-13T10:29:10+00:00", "updated_at": "2023-09-13T10:29:10+00:00" }, { "name": "CVE-2023-4385", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "e0b9e88304c957ef2591ce069709e77b6cdb00627f31b1f991b9777a30f1f8b5", "name": "linux-gkeop-source-5.4.0", "version": "5.4.0-1053.56", "filename": "linux-gkeop-source-5.4.0_5.4.0-1053.56_all.deb" }, "created_at": "2023-09-13T10:59:50+00:00", "updated_at": "2023-09-13T10:59:50+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-08-22T06:40:12+00:00", "updated_at": "2022-08-23T03:27:11+00:00", "deleted_at": null }