Zercurity data services
  • Summary
  • Applications (0)
  • Packages (0)
  • Vulnerabilities (28)

linux-image-unsigned-5.4.0-138-lowlatency

Hashes
Linux kernel image for version 5.4.0 on 64 bit x86 SMP This package contains the unsigned Linux kernel image for version 5.4.0 on 64 bit x86 SMP. Supports Lowlatency processors. Geared toward desktop and server systems. You likely do not want to install this package directly. Instead, install the linux-lowlatency meta-package, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: edcd21d3f76d51ec84c4023a82b11a84b59abf66bce9ebea10c4541d1ac65166
  • SHA1: 46804896b3724a315ddb18d84c4b6a80ff43e234
  • MD5: 501425f8005a579abd66c3f7246b15c4
Information
  • Version: 5.4.0-138.155
  • Filename: linux-image-unsigned-5.4.0-138-lowlatency_5.4.0-138.155_amd64.deb
  • Size: 14068
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-138-lowlatency

Vulnerabilities

NameRiskSourceFixed
CVE-2022-428969USN
linux-tools-common
5.4.0-137.154
CVE-2022-364310USN
linux-tools-common
5.4.0-137.154
CVE-2022-428969USN
CVE-2022-459348USN
CVE-2022-439458USN
CVE-2022-364310USN
CVE-2022-439458USN
linux-tools-host
5.4.0-137.154
CVE-2022-459348USN
linux-tools-host
5.4.0-137.154
CVE-2022-428969USN
linux-tools-host
5.4.0-137.154
CVE-2022-364310USN
linux-tools-host
5.4.0-137.154
CVE-2022-459348USN
linux-tools-common
5.4.0-137.154
CVE-2022-439458USN
linux-tools-common
5.4.0-137.154
CVE-2022-36280USN
linux-tools-host
5.4.0-139.156
CVE-2022-36409USN
linux-tools-host
5.4.0-139.156
CVE-2022-428956USN
linux-tools-host
5.4.0-139.156
CVE-2022-4185047USN
linux-tools-host
5.4.0-139.156
CVE-2022-364910USN
linux-tools-host
5.4.0-139.156
CVE-2022-4184942USN
linux-tools-host
5.4.0-139.156
CVE-2023-209288USN
linux-tools-host
5.4.0-139.156
CVE-2022-428956USN
linux-tools-common
5.4.0-139.156
CVE-2022-364910USN
linux-tools-common
5.4.0-139.156
CVE-2022-4184942USN
linux-tools-common
5.4.0-139.156
CVE-2022-4185047USN
linux-tools-common
5.4.0-139.156
CVE-2022-36280USN
linux-tools-common
5.4.0-139.156
CVE-2022-36409USN
linux-tools-common
5.4.0-139.156
CVE-2023-209288USN
linux-tools-common
5.4.0-139.156
CVE-2023-38120USN
linux-tools-host
5.4.0-139.156
CVE-2023-38120USN
linux-tools-common
5.4.0-139.156

Raw Object

{
  "sha256": "edcd21d3f76d51ec84c4023a82b11a84b59abf66bce9ebea10c4541d1ac65166",
  "sha1": "46804896b3724a315ddb18d84c4b6a80ff43e234",
  "md5": "501425f8005a579abd66c3f7246b15c4",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-image-unsigned-5.4.0-138-lowlatency",
  "filename": "linux-image-unsigned-5.4.0-138-lowlatency_5.4.0-138.155_amd64.deb",
  "size": 14068,
  "description": "Linux kernel image for version 5.4.0 on 64 bit x86 SMP\nThis package contains the unsigned Linux kernel image for version 5.4.0 on\n64 bit x86 SMP.\n\nSupports Lowlatency processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-lowlatency meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
  "url": null,
  "version": "5.4.0-138.155",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "kmod, linux-base (>= 4.5ubuntu1~16.04.1), linux-modules-5.4.0-138-lowlatency",
  "applications": [],
  "vulnerabilities": [
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-02-05T10:34:50+00:00",
      "updated_at": "2023-02-05T10:34:50+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-02-05T10:43:23+00:00",
      "updated_at": "2023-02-05T10:43:23+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:44:39+00:00",
      "updated_at": "2023-01-13T10:44:39+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:52:48+00:00",
      "updated_at": "2023-01-13T10:52:48+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:53:13+00:00",
      "updated_at": "2023-01-13T10:53:13+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-01-13T10:55:18+00:00",
      "updated_at": "2023-01-13T10:55:18+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "754b0e4066b79ddbe70afe67566c826e88b20e79aede90ac79a0143ee9435a7f",
        "name": "linux-tools-host",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-host_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:24:57+00:00",
      "updated_at": "2023-01-14T10:24:57+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "754b0e4066b79ddbe70afe67566c826e88b20e79aede90ac79a0143ee9435a7f",
        "name": "linux-tools-host",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-host_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:26:04+00:00",
      "updated_at": "2023-01-14T10:26:04+00:00"
    },
    {
      "name": "CVE-2022-42896",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "754b0e4066b79ddbe70afe67566c826e88b20e79aede90ac79a0143ee9435a7f",
        "name": "linux-tools-host",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-host_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:26:19+00:00",
      "updated_at": "2023-01-14T10:26:19+00:00"
    },
    {
      "name": "CVE-2022-3643",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "754b0e4066b79ddbe70afe67566c826e88b20e79aede90ac79a0143ee9435a7f",
        "name": "linux-tools-host",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-host_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-01-14T10:26:40+00:00",
      "updated_at": "2023-01-14T10:26:40+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-02-05T11:31:23+00:00",
      "updated_at": "2023-02-05T11:31:23+00:00"
    },
    {
      "name": "CVE-2022-43945",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "4cfca3c3eda296107eda7203c5e4d22089bb20bd7db7a5fc54b3be31e2333024",
        "name": "linux-tools-common",
        "version": "5.4.0-137.154",
        "filename": "linux-tools-common_5.4.0-137.154_all.deb"
      },
      "created_at": "2023-02-05T11:48:04+00:00",
      "updated_at": "2023-02-05T11:48:04+00:00"
    },
    {
      "name": "CVE-2022-3628",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-02-10T10:16:48+00:00",
      "updated_at": "2023-02-10T10:16:48+00:00"
    },
    {
      "name": "CVE-2022-3640",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-02-10T10:30:07+00:00",
      "updated_at": "2023-02-10T10:30:07+00:00"
    },
    {
      "name": "CVE-2022-42895",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-02-10T10:31:26+00:00",
      "updated_at": "2023-02-10T10:31:26+00:00"
    },
    {
      "name": "CVE-2022-41850",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-02-10T10:34:58+00:00",
      "updated_at": "2023-02-10T10:34:58+00:00"
    },
    {
      "name": "CVE-2022-3649",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-02-10T10:36:30+00:00",
      "updated_at": "2023-02-10T10:36:30+00:00"
    },
    {
      "name": "CVE-2022-41849",
      "risk": 42,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-02-10T10:41:12+00:00",
      "updated_at": "2023-02-10T10:41:12+00:00"
    },
    {
      "name": "CVE-2023-20928",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-02-17T12:19:51+00:00",
      "updated_at": "2023-02-17T12:19:51+00:00"
    },
    {
      "name": "CVE-2022-42895",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-03-28T09:27:01+00:00",
      "updated_at": "2023-03-28T09:27:01+00:00"
    },
    {
      "name": "CVE-2022-3649",
      "risk": 10,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-03-28T09:32:01+00:00",
      "updated_at": "2023-03-28T09:32:01+00:00"
    },
    {
      "name": "CVE-2022-41849",
      "risk": 42,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-03-28T09:34:51+00:00",
      "updated_at": "2023-03-28T09:34:51+00:00"
    },
    {
      "name": "CVE-2022-41850",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-03-28T09:46:36+00:00",
      "updated_at": "2023-03-28T09:46:36+00:00"
    },
    {
      "name": "CVE-2022-3628",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-03-28T09:52:08+00:00",
      "updated_at": "2023-03-28T09:52:08+00:00"
    },
    {
      "name": "CVE-2022-3640",
      "risk": 9,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-03-28T09:53:08+00:00",
      "updated_at": "2023-03-28T09:53:08+00:00"
    },
    {
      "name": "CVE-2023-20928",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-04-27T02:11:54+00:00",
      "updated_at": "2023-04-27T02:11:54+00:00"
    },
    {
      "name": "CVE-2023-3812",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "e699657436793ffea0f6cb95535f52bf62e01afef11ebe7c0ec88906760193c3",
        "name": "linux-tools-host",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-host_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-08-09T09:32:59+00:00",
      "updated_at": "2023-08-09T09:32:59+00:00"
    },
    {
      "name": "CVE-2023-3812",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "ea2c88e7676daf50c5822ac756d39e5e6ce585dab4feb62841a1840f0489968b",
        "name": "linux-tools-common",
        "version": "5.4.0-139.156",
        "filename": "linux-tools-common_5.4.0-139.156_all.deb"
      },
      "created_at": "2023-09-04T11:39:26+00:00",
      "updated_at": "2023-09-04T11:39:26+00:00"
    }
  ],
  "risk": 100,
  "vulnerable": 100,
  "outdated": 100,
  "malicious": 0,
  "created_at": "2023-01-09T16:50:44+00:00",
  "updated_at": "2023-01-11T11:47:37+00:00",
  "deleted_at": null
}