Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (24)

linux-image-unsigned-5.4.0-133-generic

Hashes
Linux kernel image for version 5.4.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.4.0 on 64 bit x86 SMP. Supports Generic processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-generic meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: cc679ff374311e963943d6b7afe7e51dc8ead8ce6f257a486009464f17a9725f
  • SHA1: 9e00fe8a1b1bc3554e618cff0ffe29a036bb21d1
  • MD5: 987d146fc27526adf0f3f18ba8f2e66d
Information
  • Version: 5.4.0-133.149
  • Filename: linux-image-unsigned-5.4.0-133-generic_5.4.0-133.149_amd64.deb
  • Size: 14006
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-133-generic

Vulnerabilities

NameRiskSourceFixed
CVE-2022-266353USN
linux-libc-dev
5.4.0-136.153
CVE-2022-36465USN
linux-libc-dev
5.4.0-136.153
CVE-2022-306155USN
linux-libc-dev
5.4.0-136.153
CVE-2022-358655USN
linux-libc-dev
5.4.0-136.153
CVE-2022-437508USN
linux-libc-dev
5.4.0-136.153
CVE-2022-2042178USN
linux-libc-dev
5.4.0-136.153
CVE-2022-4030747USN
linux-libc-dev
5.4.0-136.153
CVE-2022-3984278USN
linux-libc-dev
5.4.0-136.153
CVE-2022-330347USN
linux-libc-dev
5.4.0-136.153
CVE-2022-40958USN
linux-libc-dev
5.4.0-136.153
CVE-2022-4030747USN
linux-tools-host
5.4.0-136.153
CVE-2022-330347USN
linux-tools-host
5.4.0-136.153
CVE-2022-40958USN
linux-tools-host
5.4.0-136.153
CVE-2022-266353USN
linux-tools-host
5.4.0-136.153
CVE-2022-36465USN
linux-tools-host
5.4.0-136.153
CVE-2022-306155USN
linux-tools-host
5.4.0-136.153
CVE-2022-3984278USN
linux-tools-host
5.4.0-136.153
CVE-2022-2042178USN
linux-tools-host
5.4.0-136.153
CVE-2022-437508USN
linux-tools-host
5.4.0-136.153
CVE-2022-358655USN
linux-tools-host
5.4.0-136.153
CVE-2022-46620USN
linux-tools-host
5.4.0-136.153
CVE-2022-3918847USN
linux-tools-host
5.4.0-136.153
CVE-2022-424320USN
linux-tools-host
5.4.0-136.153
CVE-2023-28600USN
linux-tools-host
5.4.0-136.153

Raw Object

{
  "sha256": "cc679ff374311e963943d6b7afe7e51dc8ead8ce6f257a486009464f17a9725f",
  "sha1": "9e00fe8a1b1bc3554e618cff0ffe29a036bb21d1",
  "md5": "987d146fc27526adf0f3f18ba8f2e66d",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.4.0-133-generic",
  "filename": "linux-image-unsigned-5.4.0-133-generic_5.4.0-133.149_amd64.deb",
  "size": 14006,
  "description": "Linux kernel image for version 5.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.4.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.4.0-133.149",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-133-generic",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-2663",
      "risk": 53,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T11:58:19+00:00",
      "updated_at": "2023-01-07T11:58:19+00:00"
    },
    {
      "name": "CVE-2022-3646",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T12:23:59+00:00",
      "updated_at": "2023-01-07T12:23:59+00:00"
    },
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T13:01:05+00:00",
      "updated_at": "2023-01-07T13:01:05+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T14:23:10+00:00",
      "updated_at": "2023-01-07T14:23:10+00:00"
    },
    {
      "name": "CVE-2022-43750",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T14:47:28+00:00",
      "updated_at": "2023-01-07T14:47:28+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T14:50:01+00:00",
      "updated_at": "2023-01-07T14:50:01+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:08:34+00:00",
      "updated_at": "2023-01-07T15:08:34+00:00"
    },
    {
      "name": "CVE-2022-39842",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:34:23+00:00",
      "updated_at": "2023-01-07T15:34:23+00:00"
    },
    {
      "name": "CVE-2022-3303",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:36:59+00:00",
      "updated_at": "2023-01-07T15:36:59+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
        "name": "linux-libc-dev",
        "version": "5.4.0-136.153",
        "filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
      },
      "created_at": "2023-01-07T15:37:26+00:00",
      "updated_at": "2023-01-07T15:37:26+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:26:42+00:00",
      "updated_at": "2023-01-08T10:26:42+00:00"
    },
    {
      "name": "CVE-2022-3303",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:36:09+00:00",
      "updated_at": "2023-01-08T10:36:09+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:43:34+00:00",
      "updated_at": "2023-01-08T10:43:34+00:00"
    },
    {
      "name": "CVE-2022-2663",
      "risk": 53,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:44:03+00:00",
      "updated_at": "2023-01-08T10:44:03+00:00"
    },
    {
      "name": "CVE-2022-3646",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:44:20+00:00",
      "updated_at": "2023-01-08T10:44:20+00:00"
    },
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:48:40+00:00",
      "updated_at": "2023-01-08T10:48:40+00:00"
    },
    {
      "name": "CVE-2022-39842",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:55:19+00:00",
      "updated_at": "2023-01-08T10:55:19+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T10:56:38+00:00",
      "updated_at": "2023-01-08T10:56:38+00:00"
    },
    {
      "name": "CVE-2022-43750",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T11:00:35+00:00",
      "updated_at": "2023-01-08T11:00:35+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-01-08T11:02:57+00:00",
      "updated_at": "2023-01-08T11:02:57+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-02-18T11:46:00+00:00",
      "updated_at": "2023-02-18T11:46:00+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-04-01T10:40:39+00:00",
      "updated_at": "2023-04-01T10:40:39+00:00"
    },
    {
      "name": "CVE-2022-42432",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-04-21T09:24:09+00:00",
      "updated_at": "2023-04-21T09:24:09+00:00"
    },
    {
      "name": "CVE-2023-2860",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
        "name": "linux-tools-host",
        "version": "5.4.0-136.153",
        "filename": "linux-tools-host_5.4.0-136.153_all.deb"
      },
      "created_at": "2023-07-12T10:07:43+00:00",
      "updated_at": "2023-07-12T10:07:43+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-11-16T15:05:20+00:00",
  "updated_at": "2022-11-18T10:48:32+00:00",
  "deleted_at": null
}