Oooh, kernel 5.4 This means that Teslas are vulnerable to every exploit discovered since, and anyone wanting to gain full access to the system has a multitude of tools to get there.
Not necessarily. The problem with clipboard audits using version number matching alone is they don't account for patching. The proper way to do a vulnerability audit is by building and running code under test in sandboxed environment, and running each CVE-indicative sploit against it. For example, RHEL would be a Swiss cheese exploit magnet if they didn't regularly patch the heck out of every CVE for every component that came down the feed.
No, this does not mean that. An old version can be fully patched (at least all upstream newer bugs fixed). Not saying it's the case here though...