Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (32)

linux-gkeop-source-5.4.0

Hashes
Linux kernel source for version 5.4.0 with Ubuntu patches This package provides the source code for the Linux kernel version 5.4.0. This package is mainly meant for other packages to use, in order to build custom flavours. If you wish to use this package to create a custom Linux kernel, then it is suggested that you investigate the package kernel-package, which has been designed to ease the task of creating kernel image packages. If you are simply trying to build third-party modules for your kernel, you do not want this package. Install the appropriate linux-gkeop-headers package instead.
  • SHA256: 9acfe546fa6ececa5ceb308a5da447458619c6d6cd8d135093bf17569f7b004f
  • SHA1: 33c6e91c6b2943c392ff50b662fefedc26bf3778
  • MD5: 9b4a577b4c4dfc3a3f10b52e05a7a65e
Information
  • Version: 5.4.0-1043.44
  • Filename: linux-gkeop-source-5.4.0_5.4.0-1043.44_all.deb
  • Size: 238
  • Type: DEB
  • Source: linux-gkeop
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils, bzip2, coreutils

Vulnerabilities

NameRiskSourceFixed
CVE-2022-320271USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303970USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303870USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303670USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2303770USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2835675USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2021-377265USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-19660USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2304070USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-11580USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2149967USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2304170USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2838978USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2304270USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2021-419778USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-11980USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-151655USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2696655USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2495878USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-101178USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-13530USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2839078USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-238055USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2537555USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-322500USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-323978USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2036898USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-2042346USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-297778USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-31076USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2022-31116USN
linux-gkeop-source-5.4.0
5.4.0-1046.48
CVE-2023-16376USN
linux-gkeop-source-5.4.0
5.4.0-1046.48

Raw Object

{
  "sha256": "9acfe546fa6ececa5ceb308a5da447458619c6d6cd8d135093bf17569f7b004f",
  "sha1": "33c6e91c6b2943c392ff50b662fefedc26bf3778",
  "md5": "9b4a577b4c4dfc3a3f10b52e05a7a65e",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-gkeop-source-5.4.0",
  "filename": "linux-gkeop-source-5.4.0_5.4.0-1043.44_all.deb",
  "size": 238,
  "description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
  "url": null,
  "version": "5.4.0-1043.44",
  "source": "linux-gkeop",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils, bzip2, coreutils",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3202",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T11:06:17+00:00",
      "updated_at": "2023-02-18T11:06:17+00:00"
    },
    {
      "name": "CVE-2022-23039",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T01:47:35+00:00",
      "updated_at": "2022-06-09T01:47:35+00:00"
    },
    {
      "name": "CVE-2022-23038",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:05:28+00:00",
      "updated_at": "2022-06-09T02:05:28+00:00"
    },
    {
      "name": "CVE-2022-23036",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:05:50+00:00",
      "updated_at": "2022-06-09T02:05:50+00:00"
    },
    {
      "name": "CVE-2022-23037",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:08:42+00:00",
      "updated_at": "2022-06-09T02:08:42+00:00"
    },
    {
      "name": "CVE-2022-28356",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:09:36+00:00",
      "updated_at": "2022-06-09T02:09:36+00:00"
    },
    {
      "name": "CVE-2021-3772",
      "risk": 65,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:13:33+00:00",
      "updated_at": "2022-06-09T02:13:33+00:00"
    },
    {
      "name": "CVE-2022-1966",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:15:27+00:00",
      "updated_at": "2022-06-09T02:15:27+00:00"
    },
    {
      "name": "CVE-2022-23040",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:17:12+00:00",
      "updated_at": "2022-06-09T02:17:12+00:00"
    },
    {
      "name": "CVE-2022-1158",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:17:25+00:00",
      "updated_at": "2022-06-09T02:17:25+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:18:37+00:00",
      "updated_at": "2022-06-09T02:18:37+00:00"
    },
    {
      "name": "CVE-2022-23041",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:20:47+00:00",
      "updated_at": "2022-06-09T02:20:47+00:00"
    },
    {
      "name": "CVE-2022-28389",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:36:18+00:00",
      "updated_at": "2022-06-09T02:36:18+00:00"
    },
    {
      "name": "CVE-2022-23042",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:41:49+00:00",
      "updated_at": "2022-06-09T02:41:49+00:00"
    },
    {
      "name": "CVE-2021-4197",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:47:22+00:00",
      "updated_at": "2022-06-09T02:47:22+00:00"
    },
    {
      "name": "CVE-2022-1198",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:49:05+00:00",
      "updated_at": "2022-06-09T02:49:05+00:00"
    },
    {
      "name": "CVE-2022-1516",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:50:01+00:00",
      "updated_at": "2022-06-09T02:50:01+00:00"
    },
    {
      "name": "CVE-2022-26966",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:58:07+00:00",
      "updated_at": "2022-06-09T02:58:07+00:00"
    },
    {
      "name": "CVE-2022-24958",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T02:58:32+00:00",
      "updated_at": "2022-06-09T02:58:32+00:00"
    },
    {
      "name": "CVE-2022-1011",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T03:03:55+00:00",
      "updated_at": "2022-06-09T03:03:55+00:00"
    },
    {
      "name": "CVE-2022-1353",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T03:04:13+00:00",
      "updated_at": "2022-06-09T03:04:13+00:00"
    },
    {
      "name": "CVE-2022-28390",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-06-09T03:09:02+00:00",
      "updated_at": "2022-06-09T03:09:02+00:00"
    },
    {
      "name": "CVE-2022-2380",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-08-14T02:19:26+00:00",
      "updated_at": "2022-08-14T02:19:26+00:00"
    },
    {
      "name": "CVE-2022-25375",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-08-14T02:24:26+00:00",
      "updated_at": "2022-08-14T02:24:26+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2022-08-14T02:30:39+00:00",
      "updated_at": "2022-08-14T02:30:39+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T11:33:04+00:00",
      "updated_at": "2023-02-18T11:33:04+00:00"
    },
    {
      "name": "CVE-2022-20368",
      "risk": 98,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T11:53:29+00:00",
      "updated_at": "2023-02-18T11:53:29+00:00"
    },
    {
      "name": "CVE-2022-20423",
      "risk": 46,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T12:01:56+00:00",
      "updated_at": "2023-02-18T12:01:56+00:00"
    },
    {
      "name": "CVE-2022-2977",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-02-18T12:06:23+00:00",
      "updated_at": "2023-02-18T12:06:23+00:00"
    },
    {
      "name": "CVE-2022-3107",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-03-07T12:24:38+00:00",
      "updated_at": "2023-03-07T12:24:38+00:00"
    },
    {
      "name": "CVE-2022-3111",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-04-21T09:39:18+00:00",
      "updated_at": "2023-04-21T09:39:18+00:00"
    },
    {
      "name": "CVE-2023-1637",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "10241d68210c678efafcfc834b4e4bc094b11a0662e967645f9703a7a731ab90",
        "name": "linux-gkeop-source-5.4.0",
        "version": "5.4.0-1046.48",
        "filename": "linux-gkeop-source-5.4.0_5.4.0-1046.48_all.deb"
      },
      "created_at": "2023-04-21T09:39:50+00:00",
      "updated_at": "2023-04-21T09:39:50+00:00"
    }
  ],
  "risk": 98,
  "vulnerable": 98,
  "outdated": 98,
  "malicious": 0,
  "created_at": "2022-05-26T11:50:10+00:00",
  "updated_at": "2022-05-28T03:13:51+00:00",
  "deleted_at": null
}