Raw Object
{
"sha256": "aad7f764dc457fefaaf7d1decc9c2785689131b7e3ca36238ae787af9c6b2dee",
"sha1": "1472ecdc1a7a5dc516fa2494e33778a0d4602920",
"md5": "4d7c17335e14084bd7bb393a271f0c88",
"type": "DEB",
"arch": "ALL",
"name": "linux-gkeop-source-5.4.0",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1064.68_all.deb",
"size": 318,
"description": "Linux kernel source for version 5.4.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n5.4.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-gkeop-headers\npackage instead.",
"url": null,
"version": "5.4.0-1064.68",
"source": "linux-gkeop",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "binutils, bzip2, coreutils",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2023-0045",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:40:13+00:00",
"updated_at": "2023-03-04T10:40:13+00:00"
},
{
"name": "CVE-2022-3435",
"risk": 43,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:41:11+00:00",
"updated_at": "2023-03-04T10:41:11+00:00"
},
{
"name": "CVE-2022-47929",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:41:47+00:00",
"updated_at": "2023-03-04T10:41:47+00:00"
},
{
"name": "CVE-2023-0461",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:45:40+00:00",
"updated_at": "2023-03-04T10:45:40+00:00"
},
{
"name": "CVE-2022-3521",
"risk": 25,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:46:55+00:00",
"updated_at": "2023-03-04T10:46:55+00:00"
},
{
"name": "CVE-2022-42329",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:47:05+00:00",
"updated_at": "2023-03-04T10:47:05+00:00"
},
{
"name": "CVE-2022-4139",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:47:11+00:00",
"updated_at": "2023-03-04T10:47:11+00:00"
},
{
"name": "CVE-2022-47520",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:12+00:00",
"updated_at": "2023-03-04T10:48:12+00:00"
},
{
"name": "CVE-2022-36280",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:17+00:00",
"updated_at": "2023-03-04T10:48:17+00:00"
},
{
"name": "CVE-2022-3169",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:23+00:00",
"updated_at": "2023-03-04T10:48:23+00:00"
},
{
"name": "CVE-2022-3424",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:47+00:00",
"updated_at": "2023-03-04T10:48:47+00:00"
},
{
"name": "CVE-2023-20938",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:49:07+00:00",
"updated_at": "2023-03-04T10:49:07+00:00"
},
{
"name": "CVE-2023-0266",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:59:08+00:00",
"updated_at": "2023-03-04T10:59:08+00:00"
},
{
"name": "CVE-2022-3623",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:59:39+00:00",
"updated_at": "2023-03-04T10:59:39+00:00"
},
{
"name": "CVE-2023-0394",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:10:55+00:00",
"updated_at": "2023-03-04T11:10:55+00:00"
},
{
"name": "CVE-2023-23455",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:10:59+00:00",
"updated_at": "2023-03-04T11:10:59+00:00"
},
{
"name": "CVE-2022-3545",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:11:11+00:00",
"updated_at": "2023-03-04T11:11:11+00:00"
},
{
"name": "CVE-2022-42328",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:12:55+00:00",
"updated_at": "2023-03-04T11:12:55+00:00"
},
{
"name": "CVE-2022-41218",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:13:27+00:00",
"updated_at": "2023-03-04T11:13:27+00:00"
},
{
"name": "CVE-2023-23454",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:13:31+00:00",
"updated_at": "2023-03-04T11:13:31+00:00"
},
{
"name": "CVE-2023-28328",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-04-21T09:24:43+00:00",
"updated_at": "2023-04-21T09:24:43+00:00"
},
{
"name": "CVE-2023-26607",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-04-21T09:25:14+00:00",
"updated_at": "2023-04-21T09:25:14+00:00"
},
{
"name": "CVE-2023-1382",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-04-21T09:29:29+00:00",
"updated_at": "2023-04-21T09:29:29+00:00"
},
{
"name": "CVE-2023-2166",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-06-06T10:07:08+00:00",
"updated_at": "2023-06-06T10:07:08+00:00"
}
],
"risk": 78,
"vulnerable": 78,
"outdated": 78,
"malicious": 0,
"created_at": "2023-01-25T15:32:09+00:00",
"updated_at": "2023-02-11T11:52:20+00:00",
"deleted_at": null
}