Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (22)

linux-image-unsigned-5.4.0-136-generic

Hashes
Linux kernel image for version 5.4.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.4.0 on 64 bit x86 SMP. Supports Generic processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-generic meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 31e7358d1910d7dcaaf0b3c9f523e833da6f0e67cb6d3fa13c2e6eae832b7f97
  • SHA1: f12fe6aa36984f9ae5db734fa93136c9202281b2
  • MD5: 9905febed3acaf40dcc69021d501ea33
Information
  • Version: 5.4.0-136.153
  • Filename: linux-image-unsigned-5.4.0-136-generic_5.4.0-136.153_amd64.deb
  • Size: 14006
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-136-generic

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-doc
5.4.0-135.152
CVE-2022-356671USN
linux-doc
5.4.0-135.152
CVE-2022-356480USN
linux-doc
5.4.0-135.152
CVE-2022-356771USN
linux-doc
5.4.0-135.152
CVE-2022-36218USN
linux-doc
5.4.0-135.152
CVE-2022-352475USN
linux-doc
5.4.0-135.152
CVE-2022-356580USN
linux-doc
5.4.0-135.152
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-tools-common
5.4.0-137.154
CVE-2022-459348USN
linux-tools-common
5.4.0-137.154
CVE-2022-428969USN
linux-tools-common
5.4.0-137.154
CVE-2022-364310USN
linux-tools-common
5.4.0-137.154
CVE-2022-359475USN
linux-tools-common
5.4.0-135.152
CVE-2022-356671USN
linux-tools-common
5.4.0-135.152
CVE-2022-36218USN
linux-tools-common
5.4.0-135.152
CVE-2022-356480USN
linux-tools-common
5.4.0-135.152
CVE-2022-356771USN
linux-tools-common
5.4.0-135.152
CVE-2022-352475USN
linux-tools-common
5.4.0-135.152
CVE-2022-356580USN
linux-tools-common
5.4.0-135.152

Raw Object

{
  "sha256": "31e7358d1910d7dcaaf0b3c9f523e833da6f0e67cb6d3fa13c2e6eae832b7f97",
  "sha1": "f12fe6aa36984f9ae5db734fa93136c9202281b2",
  "md5": "9905febed3acaf40dcc69021d501ea33",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.4.0-136-generic",
  "filename": "linux-image-unsigned-5.4.0-136-generic_5.4.0-136.153_amd64.deb",
  "size": 14006,
  "description": "Linux kernel image for version 5.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.4.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.4.0-136.153",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-136-generic",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "028998d7088781c7d920cf4057f0a377b3d1c4f05c0957de980c069f8980c697",
        "name": "linux-doc",
        "version": "5.4.0-135.152",
        "filename": "linux-doc_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:25:41+00:00",
      "updated_at": "2022-12-02T12:25:41+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "028998d7088781c7d920cf4057f0a377b3d1c4f05c0957de980c069f8980c697",
        "name": "linux-doc",
        "version": "5.4.0-135.152",
        "filename": "linux-doc_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:41:40+00:00",
      "updated_at": "2022-12-02T12:41:40+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "028998d7088781c7d920cf4057f0a377b3d1c4f05c0957de980c069f8980c697",
        "name": "linux-doc",
        "version": "5.4.0-135.152",
        "filename": "linux-doc_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:42:25+00:00",
      "updated_at": "2022-12-02T12:42:25+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "028998d7088781c7d920cf4057f0a377b3d1c4f05c0957de980c069f8980c697",
        "name": "linux-doc",
        "version": "5.4.0-135.152",
        "filename": "linux-doc_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:43:13+00:00",
      "updated_at": "2022-12-02T12:43:13+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "028998d7088781c7d920cf4057f0a377b3d1c4f05c0957de980c069f8980c697",
        "name": "linux-doc",
        "version": "5.4.0-135.152",
        "filename": "linux-doc_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:44:18+00:00",
      "updated_at": "2022-12-02T12:44:18+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "028998d7088781c7d920cf4057f0a377b3d1c4f05c0957de980c069f8980c697",
        "name": "linux-doc",
        "version": "5.4.0-135.152",
        "filename": "linux-doc_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:45:43+00:00",
      "updated_at": "2022-12-02T12:45:43+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "028998d7088781c7d920cf4057f0a377b3d1c4f05c0957de980c069f8980c697",
        "name": "linux-doc",
        "version": "5.4.0-135.152",
        "filename": "linux-doc_5.4.0-135.152_all.deb"
      },
      "created_at": "2022-12-02T12:46:23+00:00",
      "updated_at": "2022-12-02T12:46:23+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:44:38+00:00",
      "updated_at": "2023-01-13T10:44:38+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:46+00:00",
      "updated_at": "2023-01-13T10:52:46+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:11+00:00",
      "updated_at": "2023-01-13T10:53:11+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:16+00:00",
      "updated_at": "2023-01-13T10:55:16+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:24:57+00:00",
      "updated_at": "2023-01-14T10:24:57+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:26:03+00:00",
      "updated_at": "2023-01-14T10:26:03+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:26:19+00:00",
      "updated_at": "2023-01-14T10:26:19+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:26:40+00:00",
      "updated_at": "2023-01-14T10:26:40+00:00"
    },
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9c49c8258056eb331341adde527802a1ab0915e22f6def483e317dd34a00c37",
        "name": "linux-tools-common",
        "version": "5.4.0-135.152",
        "filename": "linux-tools-common_5.4.0-135.152_all.deb"
      },
      "created_at": "2023-01-21T10:58:48+00:00",
      "updated_at": "2023-01-21T10:58:48+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9c49c8258056eb331341adde527802a1ab0915e22f6def483e317dd34a00c37",
        "name": "linux-tools-common",
        "version": "5.4.0-135.152",
        "filename": "linux-tools-common_5.4.0-135.152_all.deb"
      },
      "created_at": "2023-01-26T20:04:17+00:00",
      "updated_at": "2023-01-26T20:04:17+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9c49c8258056eb331341adde527802a1ab0915e22f6def483e317dd34a00c37",
        "name": "linux-tools-common",
        "version": "5.4.0-135.152",
        "filename": "linux-tools-common_5.4.0-135.152_all.deb"
      },
      "created_at": "2023-01-27T03:22:47+00:00",
      "updated_at": "2023-01-27T03:22:47+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9c49c8258056eb331341adde527802a1ab0915e22f6def483e317dd34a00c37",
        "name": "linux-tools-common",
        "version": "5.4.0-135.152",
        "filename": "linux-tools-common_5.4.0-135.152_all.deb"
      },
      "created_at": "2023-01-27T03:41:20+00:00",
      "updated_at": "2023-01-27T03:41:20+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9c49c8258056eb331341adde527802a1ab0915e22f6def483e317dd34a00c37",
        "name": "linux-tools-common",
        "version": "5.4.0-135.152",
        "filename": "linux-tools-common_5.4.0-135.152_all.deb"
      },
      "created_at": "2023-01-27T05:31:24+00:00",
      "updated_at": "2023-01-27T05:31:24+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9c49c8258056eb331341adde527802a1ab0915e22f6def483e317dd34a00c37",
        "name": "linux-tools-common",
        "version": "5.4.0-135.152",
        "filename": "linux-tools-common_5.4.0-135.152_all.deb"
      },
      "created_at": "2023-01-27T17:45:44+00:00",
      "updated_at": "2023-01-27T17:45:44+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "a9c49c8258056eb331341adde527802a1ab0915e22f6def483e317dd34a00c37",
        "name": "linux-tools-common",
        "version": "5.4.0-135.152",
        "filename": "linux-tools-common_5.4.0-135.152_all.deb"
      },
      "created_at": "2023-01-27T18:45:43+00:00",
      "updated_at": "2023-01-27T18:45:43+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2022-11-24T18:14:11+00:00",
  "updated_at": "2022-12-01T10:34:42+00:00",
  "deleted_at": null
}