Raw Object
{
"sha256": "9acfe546fa6ececa5ceb308a5da447458619c6d6cd8d135093bf17569f7b004f",
"sha1": "33c6e91c6b2943c392ff50b662fefedc26bf3778",
"md5": "9b4a577b4c4dfc3a3f10b52e05a7a65e",
"type": "DEB",
"arch": "ALL",
"name": "linux-gkeop-source-5.4.0",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1043.44_all.deb",
"size": 238,
"description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
"url": null,
"version": "5.4.0-1043.44",
"source": "linux-gkeop",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "binutils, bzip2, coreutils",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2022-3202",
"risk": 71,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-02-18T11:06:17+00:00",
"updated_at": "2023-02-18T11:06:17+00:00"
},
{
"name": "CVE-2022-23039",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T01:47:35+00:00",
"updated_at": "2022-06-09T01:47:35+00:00"
},
{
"name": "CVE-2022-23038",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:05:28+00:00",
"updated_at": "2022-06-09T02:05:28+00:00"
},
{
"name": "CVE-2022-23036",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:05:50+00:00",
"updated_at": "2022-06-09T02:05:50+00:00"
},
{
"name": "CVE-2022-23037",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:08:42+00:00",
"updated_at": "2022-06-09T02:08:42+00:00"
},
{
"name": "CVE-2022-28356",
"risk": 75,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:09:36+00:00",
"updated_at": "2022-06-09T02:09:36+00:00"
},
{
"name": "CVE-2021-3772",
"risk": 65,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:13:33+00:00",
"updated_at": "2022-06-09T02:13:33+00:00"
},
{
"name": "CVE-2022-1966",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:15:27+00:00",
"updated_at": "2022-06-09T02:15:27+00:00"
},
{
"name": "CVE-2022-23040",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:17:12+00:00",
"updated_at": "2022-06-09T02:17:12+00:00"
},
{
"name": "CVE-2022-1158",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:17:25+00:00",
"updated_at": "2022-06-09T02:17:25+00:00"
},
{
"name": "CVE-2022-21499",
"risk": 67,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:18:37+00:00",
"updated_at": "2022-06-09T02:18:37+00:00"
},
{
"name": "CVE-2022-23041",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:20:47+00:00",
"updated_at": "2022-06-09T02:20:47+00:00"
},
{
"name": "CVE-2022-28389",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:36:18+00:00",
"updated_at": "2022-06-09T02:36:18+00:00"
},
{
"name": "CVE-2022-23042",
"risk": 70,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:41:49+00:00",
"updated_at": "2022-06-09T02:41:49+00:00"
},
{
"name": "CVE-2021-4197",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:47:22+00:00",
"updated_at": "2022-06-09T02:47:22+00:00"
},
{
"name": "CVE-2022-1198",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:49:05+00:00",
"updated_at": "2022-06-09T02:49:05+00:00"
},
{
"name": "CVE-2022-1516",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:50:01+00:00",
"updated_at": "2022-06-09T02:50:01+00:00"
},
{
"name": "CVE-2022-26966",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:58:07+00:00",
"updated_at": "2022-06-09T02:58:07+00:00"
},
{
"name": "CVE-2022-24958",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T02:58:32+00:00",
"updated_at": "2022-06-09T02:58:32+00:00"
},
{
"name": "CVE-2022-1011",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T03:03:55+00:00",
"updated_at": "2022-06-09T03:03:55+00:00"
},
{
"name": "CVE-2022-1353",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T03:04:13+00:00",
"updated_at": "2022-06-09T03:04:13+00:00"
},
{
"name": "CVE-2022-28390",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-06-09T03:09:02+00:00",
"updated_at": "2022-06-09T03:09:02+00:00"
},
{
"name": "CVE-2022-2380",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-08-14T02:19:26+00:00",
"updated_at": "2022-08-14T02:19:26+00:00"
},
{
"name": "CVE-2022-25375",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-08-14T02:24:26+00:00",
"updated_at": "2022-08-14T02:24:26+00:00"
},
{
"name": "CVE-2022-32250",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2022-08-14T02:30:39+00:00",
"updated_at": "2022-08-14T02:30:39+00:00"
},
{
"name": "CVE-2022-3239",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-02-18T11:33:04+00:00",
"updated_at": "2023-02-18T11:33:04+00:00"
},
{
"name": "CVE-2022-20368",
"risk": 98,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-02-18T11:53:29+00:00",
"updated_at": "2023-02-18T11:53:29+00:00"
},
{
"name": "CVE-2022-20423",
"risk": 46,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-02-18T12:01:56+00:00",
"updated_at": "2023-02-18T12:01:56+00:00"
},
{
"name": "CVE-2022-2977",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-02-18T12:06:23+00:00",
"updated_at": "2023-02-18T12:06:23+00:00"
},
{
"name": "CVE-2022-3107",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-03-07T12:24:38+00:00",
"updated_at": "2023-03-07T12:24:38+00:00"
},
{
"name": "CVE-2022-3111",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-04-21T09:39:18+00:00",
"updated_at": "2023-04-21T09:39:18+00:00"
},
{
"name": "CVE-2023-1637",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1046.48",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
},
"created_at": "2023-04-21T09:39:50+00:00",
"updated_at": "2023-04-21T09:39:50+00:00"
}
],
"risk": 98,
"vulnerable": 98,
"outdated": 98,
"malicious": 0,
"created_at": "2022-05-26T11:50:10+00:00",
"updated_at": "2022-05-28T03:13:51+00:00",
"deleted_at": null
}