Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (14)

linux-image-unsigned-5.4.0-133-lowlatency

Hashes
Linux kernel image for version 5.4.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.4.0 on 64 bit x86 SMP. Supports Lowlatency processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-lowlatency meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 01e4d404254d437a6590cb9721a7528c021eeafc7b9ce5c96f0598ba6421d5e8
  • SHA1: a369842f7a55fd248e25c00211c2b2d4f2f35c8b
  • MD5: e108d5197d0aa84193f8a72841e79ca5
Information
  • Version: 5.4.0-133.149
  • Filename: linux-image-unsigned-5.4.0-133-lowlatency_5.4.0-133.149_amd64.deb
  • Size: 14058
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-133-lowlatency

Vulnerabilities

NameRiskSourceFixed
CVE-2022-266353USN
linux-libc-dev
5.4.0-136.153
CVE-2022-36465USN
linux-libc-dev
5.4.0-136.153
CVE-2022-306155USN
linux-libc-dev
5.4.0-136.153
CVE-2022-358655USN
linux-libc-dev
5.4.0-136.153
CVE-2022-437508USN
linux-libc-dev
5.4.0-136.153
CVE-2022-2042178USN
linux-libc-dev
5.4.0-136.153
CVE-2022-4030747USN
linux-libc-dev
5.4.0-136.153
CVE-2022-3984278USN
linux-libc-dev
5.4.0-136.153
CVE-2022-330347USN
linux-libc-dev
5.4.0-136.153
CVE-2022-40958USN
linux-libc-dev
5.4.0-136.153
CVE-2022-46620USN
linux-libc-dev
5.4.0-136.153
CVE-2022-3918847USN
linux-libc-dev
5.4.0-136.153
CVE-2022-424320USN
linux-libc-dev
5.4.0-136.153
CVE-2023-28600USN
linux-libc-dev
5.4.0-136.153

Raw Object

{
  "sha256": "01e4d404254d437a6590cb9721a7528c021eeafc7b9ce5c96f0598ba6421d5e8",
  "sha1": "a369842f7a55fd248e25c00211c2b2d4f2f35c8b",
  "md5": "e108d5197d0aa84193f8a72841e79ca5",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.4.0-133-lowlatency",
  "filename": "linux-image-unsigned-5.4.0-133-lowlatency_5.4.0-133.149_amd64.deb",
  "size": 14058,
  "description": "Linux kernel image for version 5.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.4.0 on\n64 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.4.0-133.149",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-133-lowlatency",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-2663",
      "risk": 53,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T11:58:19+00:00",
      "updated_at": "2023-01-07T11:58:19+00:00"
    },
    {
      "name": "CVE-2022-3646",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T12:23:59+00:00",
      "updated_at": "2023-01-07T12:23:59+00:00"
    },
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T13:01:05+00:00",
      "updated_at": "2023-01-07T13:01:05+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T14:23:11+00:00",
      "updated_at": "2023-01-07T14:23:11+00:00"
    },
    {
      "name": "CVE-2022-43750",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T14:47:28+00:00",
      "updated_at": "2023-01-07T14:47:28+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T14:50:01+00:00",
      "updated_at": "2023-01-07T14:50:01+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:08:34+00:00",
      "updated_at": "2023-01-07T15:08:34+00:00"
    },
    {
      "name": "CVE-2022-39842",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:34:24+00:00",
      "updated_at": "2023-01-07T15:34:24+00:00"
    },
    {
      "name": "CVE-2022-3303",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:36:59+00:00",
      "updated_at": "2023-01-07T15:36:59+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:37:26+00:00",
      "updated_at": "2023-01-07T15:37:26+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-02-18T11:45:59+00:00",
      "updated_at": "2023-02-18T11:45:59+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-04-01T10:40:39+00:00",
      "updated_at": "2023-04-01T10:40:39+00:00"
    },
    {
      "name": "CVE-2022-42432",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-04-21T09:24:09+00:00",
      "updated_at": "2023-04-21T09:24:09+00:00"
    },
    {
      "name": "CVE-2023-2860",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-07-12T10:07:42+00:00",
      "updated_at": "2023-07-12T10:07:42+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-11-16T15:05:23+00:00",
  "updated_at": "2022-11-18T10:48:36+00:00",
  "deleted_at": null
}