Raw Object
{
"sha256": "cc679ff374311e963943d6b7afe7e51dc8ead8ce6f257a486009464f17a9725f",
"sha1": "9e00fe8a1b1bc3554e618cff0ffe29a036bb21d1",
"md5": "987d146fc27526adf0f3f18ba8f2e66d",
"type": "DEB",
"arch": "AMD64",
"name": "linux-image-unsigned-5.4.0-133-generic",
"filename": "linux-image-unsigned-5.4.0-133-generic_5.4.0-133.149_amd64.deb",
"size": 14006,
"description": "Linux kernel image for version 5.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.4.0 on\n64 bit x86 SMP.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
"url": null,
"version": "5.4.0-133.149",
"source": "linux",
"owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
"dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-133-generic",
"applications": [],
"vulnerabilities": [
{
"name": "CVE-2022-2663",
"risk": 53,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T11:58:19+00:00",
"updated_at": "2023-01-07T11:58:19+00:00"
},
{
"name": "CVE-2022-3646",
"risk": 5,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T12:23:59+00:00",
"updated_at": "2023-01-07T12:23:59+00:00"
},
{
"name": "CVE-2022-3061",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T13:01:05+00:00",
"updated_at": "2023-01-07T13:01:05+00:00"
},
{
"name": "CVE-2022-3586",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T14:23:10+00:00",
"updated_at": "2023-01-07T14:23:10+00:00"
},
{
"name": "CVE-2022-43750",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T14:47:28+00:00",
"updated_at": "2023-01-07T14:47:28+00:00"
},
{
"name": "CVE-2022-20421",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T14:50:01+00:00",
"updated_at": "2023-01-07T14:50:01+00:00"
},
{
"name": "CVE-2022-40307",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T15:08:34+00:00",
"updated_at": "2023-01-07T15:08:34+00:00"
},
{
"name": "CVE-2022-39842",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T15:34:23+00:00",
"updated_at": "2023-01-07T15:34:23+00:00"
},
{
"name": "CVE-2022-3303",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T15:36:59+00:00",
"updated_at": "2023-01-07T15:36:59+00:00"
},
{
"name": "CVE-2022-4095",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "70a3c679a19eeb1944763d9dabfa0162a57a58cd672dc8e67fe2d53f46ad7756",
"name": "linux-libc-dev",
"version": "5.4.0-136.153",
"filename": "linux-libc-dev_5.4.0-136.153_i386.deb"
},
"created_at": "2023-01-07T15:37:26+00:00",
"updated_at": "2023-01-07T15:37:26+00:00"
},
{
"name": "CVE-2022-40307",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:26:42+00:00",
"updated_at": "2023-01-08T10:26:42+00:00"
},
{
"name": "CVE-2022-3303",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:36:09+00:00",
"updated_at": "2023-01-08T10:36:09+00:00"
},
{
"name": "CVE-2022-4095",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:43:34+00:00",
"updated_at": "2023-01-08T10:43:34+00:00"
},
{
"name": "CVE-2022-2663",
"risk": 53,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:44:03+00:00",
"updated_at": "2023-01-08T10:44:03+00:00"
},
{
"name": "CVE-2022-3646",
"risk": 5,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:44:20+00:00",
"updated_at": "2023-01-08T10:44:20+00:00"
},
{
"name": "CVE-2022-3061",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:48:40+00:00",
"updated_at": "2023-01-08T10:48:40+00:00"
},
{
"name": "CVE-2022-39842",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:55:19+00:00",
"updated_at": "2023-01-08T10:55:19+00:00"
},
{
"name": "CVE-2022-20421",
"risk": 78,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T10:56:38+00:00",
"updated_at": "2023-01-08T10:56:38+00:00"
},
{
"name": "CVE-2022-43750",
"risk": 8,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T11:00:35+00:00",
"updated_at": "2023-01-08T11:00:35+00:00"
},
{
"name": "CVE-2022-3586",
"risk": 55,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-01-08T11:02:57+00:00",
"updated_at": "2023-01-08T11:02:57+00:00"
},
{
"name": "CVE-2022-4662",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-02-18T11:46:00+00:00",
"updated_at": "2023-02-18T11:46:00+00:00"
},
{
"name": "CVE-2022-39188",
"risk": 47,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-04-01T10:40:39+00:00",
"updated_at": "2023-04-01T10:40:39+00:00"
},
{
"name": "CVE-2022-42432",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-04-21T09:24:09+00:00",
"updated_at": "2023-04-21T09:24:09+00:00"
},
{
"name": "CVE-2023-2860",
"risk": 0,
"source": "USN",
"sid": null,
"fixed": {
"sha256": "bdb4f5606eaa0270d2969cef8e55ec4e46a9c0421c49877e8e897208fd1f63ed",
"name": "linux-tools-host",
"version": "5.4.0-136.153",
"filename": "linux-tools-host_5.4.0-136.153_all.deb"
},
"created_at": "2023-07-12T10:07:43+00:00",
"updated_at": "2023-07-12T10:07:43+00:00"
}
],
"risk": 78,
"vulnerable": 78,
"outdated": 78,
"malicious": 0,
"created_at": "2022-11-16T15:05:20+00:00",
"updated_at": "2022-11-18T10:48:32+00:00",
"deleted_at": null
}