Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (24)

linux-image-unsigned-5.4.0-139-generic

Hashes
Linux kernel image for version 5.4.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.4.0 on 64 bit x86 SMP. Supports Generic processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-generic meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: 8015a7b392b32bcabdbb466b6b908f17ae4b14401564af1052f7e90060f55e22
  • SHA1: db8d81ad43aa1c75586574adf864e058385913b1
  • MD5: 4868ac74b7cddf03e6dadc7149cce4d5
Information
  • Version: 5.4.0-139.156
  • Filename: linux-image-unsigned-5.4.0-139-generic_5.4.0-139.156_amd64.deb
  • Size: 14020
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-139-generic

Vulnerabilities

NameRiskSourceFixed
CVE-2023-00450USN
linux-doc
5.4.0-144.161
CVE-2022-343543USN
linux-doc
5.4.0-144.161
CVE-2022-479296USN
linux-doc
5.4.0-144.161
CVE-2023-04610USN
linux-doc
5.4.0-144.161
CVE-2022-352125USN
linux-doc
5.4.0-144.161
CVE-2022-423296USN
linux-doc
5.4.0-144.161
CVE-2022-41390USN
linux-doc
5.4.0-144.161
CVE-2022-475207USN
linux-doc
5.4.0-144.161
CVE-2022-3628055USN
linux-doc
5.4.0-144.161
CVE-2022-316955USN
linux-doc
5.4.0-144.161
CVE-2022-34248USN
linux-doc
5.4.0-144.161
CVE-2023-209388USN
linux-doc
5.4.0-144.161
CVE-2023-02668USN
linux-doc
5.4.0-144.161
CVE-2022-36238USN
linux-doc
5.4.0-144.161
CVE-2023-03946USN
linux-doc
5.4.0-144.161
CVE-2023-234550USN
linux-doc
5.4.0-144.161
CVE-2022-354578USN
linux-doc
5.4.0-144.161
CVE-2022-423286USN
linux-doc
5.4.0-144.161
CVE-2022-4121855USN
linux-doc
5.4.0-144.161
CVE-2023-234540USN
linux-doc
5.4.0-144.161
CVE-2023-283280USN
linux-doc
5.4.0-144.161
CVE-2023-266077USN
linux-doc
5.4.0-144.161
CVE-2023-13820USN
linux-doc
5.4.0-144.161
CVE-2023-21660USN
linux-doc
5.4.0-144.161

Raw Object

{
  "sha256": "8015a7b392b32bcabdbb466b6b908f17ae4b14401564af1052f7e90060f55e22",
  "sha1": "db8d81ad43aa1c75586574adf864e058385913b1",
  "md5": "4868ac74b7cddf03e6dadc7149cce4d5",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.4.0-139-generic",
  "filename": "linux-image-unsigned-5.4.0-139-generic_5.4.0-139.156_amd64.deb",
  "size": 14020,
  "description": "Linux kernel image for version 5.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.4.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.4.0-139.156",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-139-generic",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2023-0045",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:38:17+00:00",
      "updated_at": "2023-03-04T10:38:17+00:00"
    },
    {
      "name": "CVE-2022-3435",
      "risk": 43,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:41:07+00:00",
      "updated_at": "2023-03-04T10:41:07+00:00"
    },
    {
      "name": "CVE-2022-47929",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:41:45+00:00",
      "updated_at": "2023-03-04T10:41:45+00:00"
    },
    {
      "name": "CVE-2023-0461",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:44:43+00:00",
      "updated_at": "2023-03-04T10:44:43+00:00"
    },
    {
      "name": "CVE-2022-3521",
      "risk": 25,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:46:50+00:00",
      "updated_at": "2023-03-04T10:46:50+00:00"
    },
    {
      "name": "CVE-2022-42329",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:46:59+00:00",
      "updated_at": "2023-03-04T10:46:59+00:00"
    },
    {
      "name": "CVE-2022-4139",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:47:06+00:00",
      "updated_at": "2023-03-04T10:47:06+00:00"
    },
    {
      "name": "CVE-2022-47520",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:48:08+00:00",
      "updated_at": "2023-03-04T10:48:08+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:48:16+00:00",
      "updated_at": "2023-03-04T10:48:16+00:00"
    },
    {
      "name": "CVE-2022-3169",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:48:19+00:00",
      "updated_at": "2023-03-04T10:48:19+00:00"
    },
    {
      "name": "CVE-2022-3424",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:48:46+00:00",
      "updated_at": "2023-03-04T10:48:46+00:00"
    },
    {
      "name": "CVE-2023-20938",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:49:05+00:00",
      "updated_at": "2023-03-04T10:49:05+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:59:06+00:00",
      "updated_at": "2023-03-04T10:59:06+00:00"
    },
    {
      "name": "CVE-2022-3623",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T10:59:34+00:00",
      "updated_at": "2023-03-04T10:59:34+00:00"
    },
    {
      "name": "CVE-2023-0394",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T11:10:53+00:00",
      "updated_at": "2023-03-04T11:10:53+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T11:10:57+00:00",
      "updated_at": "2023-03-04T11:10:57+00:00"
    },
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T11:11:06+00:00",
      "updated_at": "2023-03-04T11:11:06+00:00"
    },
    {
      "name": "CVE-2022-42328",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T11:12:50+00:00",
      "updated_at": "2023-03-04T11:12:50+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T11:13:25+00:00",
      "updated_at": "2023-03-04T11:13:25+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-03-04T11:13:29+00:00",
      "updated_at": "2023-03-04T11:13:29+00:00"
    },
    {
      "name": "CVE-2023-28328",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-04-21T09:24:37+00:00",
      "updated_at": "2023-04-21T09:24:37+00:00"
    },
    {
      "name": "CVE-2023-26607",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-04-21T09:25:07+00:00",
      "updated_at": "2023-04-21T09:25:07+00:00"
    },
    {
      "name": "CVE-2023-1382",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-04-21T09:29:24+00:00",
      "updated_at": "2023-04-21T09:29:24+00:00"
    },
    {
      "name": "CVE-2023-2166",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "c41ab3f7d4922f9f14ee6736b4478a84e4f1f9f367b467c3cab2148342cd89d4",
        "name": "linux-doc",
        "version": "5.4.0-144.161",
        "filename": "linux-doc_5.4.0-144.161_all.deb"
      },
      "created_at": "2023-06-06T10:07:01+00:00",
      "updated_at": "2023-06-06T10:07:01+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2023-01-20T19:46:09+00:00",
  "updated_at": "2023-01-26T10:25:46+00:00",
  "deleted_at": null
}