Raw Object
{
"sha256": "f6d78efdb2b8ca8186e2f002811c45a4f04490001241ae07d628f6cf32e36909",
"sha1": "bdcc5d7cb833d4d580299153c6b214aad1143b45",
"md5": "dd25156acdcdc4e06af240640990665e",
"type": "DEB",
"arch": "AMD64",
"name": "linux-image-unsigned-5.4.0-1064-gkeop",
"filename": "linux-image-unsigned-5.4.0-1064-gkeop_5.4.0-1064.68_amd64.deb",
"size": 13685,
"description": "Linux kernel image for version 5.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.4.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward GKE on-prem installations.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-gkeop meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
"url": null,
"version": "5.4.0-1064.68",
"source": "linux-gkeop",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-1064-gkeop",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2023-0045",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:40:13+00:00",
"updated_at": "2023-03-04T10:40:13+00:00"
},
{
"name": "CVE-2022-3435",
"risk": 43,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:41:11+00:00",
"updated_at": "2023-03-04T10:41:11+00:00"
},
{
"name": "CVE-2022-47929",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:41:47+00:00",
"updated_at": "2023-03-04T10:41:47+00:00"
},
{
"name": "CVE-2023-0461",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:45:40+00:00",
"updated_at": "2023-03-04T10:45:40+00:00"
},
{
"name": "CVE-2022-3521",
"risk": 25,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:46:55+00:00",
"updated_at": "2023-03-04T10:46:55+00:00"
},
{
"name": "CVE-2022-42329",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:47:05+00:00",
"updated_at": "2023-03-04T10:47:05+00:00"
},
{
"name": "CVE-2022-4139",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:47:11+00:00",
"updated_at": "2023-03-04T10:47:11+00:00"
},
{
"name": "CVE-2022-47520",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:12+00:00",
"updated_at": "2023-03-04T10:48:12+00:00"
},
{
"name": "CVE-2022-36280",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:17+00:00",
"updated_at": "2023-03-04T10:48:17+00:00"
},
{
"name": "CVE-2022-3169",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:23+00:00",
"updated_at": "2023-03-04T10:48:23+00:00"
},
{
"name": "CVE-2022-3424",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:48:47+00:00",
"updated_at": "2023-03-04T10:48:47+00:00"
},
{
"name": "CVE-2023-20938",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:49:07+00:00",
"updated_at": "2023-03-04T10:49:07+00:00"
},
{
"name": "CVE-2023-0266",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:59:08+00:00",
"updated_at": "2023-03-04T10:59:08+00:00"
},
{
"name": "CVE-2022-3623",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T10:59:39+00:00",
"updated_at": "2023-03-04T10:59:39+00:00"
},
{
"name": "CVE-2023-0394",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:10:55+00:00",
"updated_at": "2023-03-04T11:10:55+00:00"
},
{
"name": "CVE-2023-23455",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:10:59+00:00",
"updated_at": "2023-03-04T11:10:59+00:00"
},
{
"name": "CVE-2022-3545",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:11:11+00:00",
"updated_at": "2023-03-04T11:11:11+00:00"
},
{
"name": "CVE-2022-42328",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:12:55+00:00",
"updated_at": "2023-03-04T11:12:55+00:00"
},
{
"name": "CVE-2022-41218",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:13:27+00:00",
"updated_at": "2023-03-04T11:13:27+00:00"
},
{
"name": "CVE-2023-23454",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-03-04T11:13:31+00:00",
"updated_at": "2023-03-04T11:13:31+00:00"
},
{
"name": "CVE-2022-3424",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:22:14+00:00",
"updated_at": "2023-03-08T10:22:14+00:00"
},
{
"name": "CVE-2022-42328",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:22:29+00:00",
"updated_at": "2023-03-08T10:22:29+00:00"
},
{
"name": "CVE-2022-3435",
"risk": 43,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:23:24+00:00",
"updated_at": "2023-03-08T10:23:24+00:00"
},
{
"name": "CVE-2023-0461",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:23:41+00:00",
"updated_at": "2023-03-08T10:23:41+00:00"
},
{
"name": "CVE-2023-23455",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:25:16+00:00",
"updated_at": "2023-03-08T10:25:16+00:00"
},
{
"name": "CVE-2022-4139",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:26:22+00:00",
"updated_at": "2023-03-08T10:26:22+00:00"
},
{
"name": "CVE-2022-47520",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:26:52+00:00",
"updated_at": "2023-03-08T10:26:52+00:00"
},
{
"name": "CVE-2022-36280",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:28:55+00:00",
"updated_at": "2023-03-08T10:28:55+00:00"
},
{
"name": "CVE-2022-47929",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:32:56+00:00",
"updated_at": "2023-03-08T10:32:56+00:00"
},
{
"name": "CVE-2022-42329",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:33:14+00:00",
"updated_at": "2023-03-08T10:33:14+00:00"
},
{
"name": "CVE-2022-3169",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:33:35+00:00",
"updated_at": "2023-03-08T10:33:35+00:00"
},
{
"name": "CVE-2023-23454",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:45:13+00:00",
"updated_at": "2023-03-08T10:45:13+00:00"
},
{
"name": "CVE-2022-3623",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:59:40+00:00",
"updated_at": "2023-03-08T10:59:40+00:00"
},
{
"name": "CVE-2023-0045",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T10:59:45+00:00",
"updated_at": "2023-03-08T10:59:45+00:00"
},
{
"name": "CVE-2023-0394",
"risk": 6,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T11:00:46+00:00",
"updated_at": "2023-03-08T11:00:46+00:00"
},
{
"name": "CVE-2022-3521",
"risk": 25,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T11:01:07+00:00",
"updated_at": "2023-03-08T11:01:07+00:00"
},
{
"name": "CVE-2023-0266",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T11:10:03+00:00",
"updated_at": "2023-03-08T11:10:03+00:00"
},
{
"name": "CVE-2022-3545",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T11:10:14+00:00",
"updated_at": "2023-03-08T11:10:14+00:00"
},
{
"name": "CVE-2022-41218",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T11:10:57+00:00",
"updated_at": "2023-03-08T11:10:57+00:00"
},
{
"name": "CVE-2023-20938",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-03-08T11:11:01+00:00",
"updated_at": "2023-03-08T11:11:01+00:00"
},
{
"name": "CVE-2023-28328",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-04-21T09:24:43+00:00",
"updated_at": "2023-04-21T09:24:43+00:00"
},
{
"name": "CVE-2023-26607",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-04-21T09:25:14+00:00",
"updated_at": "2023-04-21T09:25:14+00:00"
},
{
"name": "CVE-2023-1382",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-04-21T09:29:29+00:00",
"updated_at": "2023-04-21T09:29:29+00:00"
},
{
"name": "CVE-2023-26607",
"risk": 7,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-05-31T09:17:20+00:00",
"updated_at": "2023-05-31T09:17:20+00:00"
},
{
"name": "CVE-2023-1382",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-05-31T10:12:49+00:00",
"updated_at": "2023-05-31T10:12:49+00:00"
},
{
"name": "CVE-2023-28328",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "a065c321515b1985ad12ff184cff5f341860311279f2dfbc1779b3dbee93d286",
"name": "linux-gkeop-source-5.4.0",
"version": "5.4.0-1065.69",
"filename": "linux-gkeop-source-5.4.0_5.4.0-1065.69_all.deb"
},
"created_at": "2023-05-31T11:21:47+00:00",
"updated_at": "2023-05-31T11:21:47+00:00"
},
{
"name": "CVE-2023-2166",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": null,
"created_at": "2023-06-06T10:07:08+00:00",
"updated_at": "2023-06-06T10:07:08+00:00"
}
],
"risk": 78,
"vulnerable": 78,
"outdated": 78,
"malicious": 0,
"created_at": "2023-01-25T15:32:09+00:00",
"updated_at": "2023-02-11T11:52:28+00:00",
"deleted_at": null
}