441ddf66249dad30a6d73f00f6571a7dd1edc98e179dc86e0dd16f1142259a89
f00dfba14c5b0d90ea3e68ff0a7697484cf79eeb
fe7b1de96bb10cbb3582b6f5a5a326e0
5.15.0-56.62
linux-modules-iwlwifi-5.15.0-56-generic_5.15.0-56.62_amd64.deb
6259
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
linux-image-5.15.0-56-generic | linux-image-unsigned-5.15.0-56-generic
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
cfg80211.ko /lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/cfg80211.ko | 1604969 | 0 | ||
iwlwifi.ko /lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/iwlwifi.ko | 948993 | 0 | ||
compat.ko /lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/compat.ko | 8529 | 0 | ||
mac80211.ko /lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/mac80211.ko | 2053137 | 0 | ||
iwlmvm.ko /lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/iwlmvm.ko | 1218737 | 0 | ||
iwlxvt.ko /lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/iwlxvt.ko | 128473 | 0 |
{ "sha256": "441ddf66249dad30a6d73f00f6571a7dd1edc98e179dc86e0dd16f1142259a89", "sha1": "f00dfba14c5b0d90ea3e68ff0a7697484cf79eeb", "md5": "fe7b1de96bb10cbb3582b6f5a5a326e0", "type": "DEB", "arch": "AMD64", "name": "linux-modules-iwlwifi-5.15.0-56-generic", "filename": "linux-modules-iwlwifi-5.15.0-56-generic_5.15.0-56.62_amd64.deb", "size": 6259, "description": "Linux kernel iwlwifi modules for version 5.15.0-56\nThis package provides the Linux kernel iwlwifi modules for version\n5.15.0-56.\n\nYou likely do not want to install this package directly. Instead, install the\none of the linux-modules-iwlwifi-generic* meta-packages,\nwhich will ensure that upgrades work correctly, and that supporting packages are\nalso installed.", "url": null, "version": "5.15.0-56.62", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-5.15.0-56-generic | linux-image-unsigned-5.15.0-56-generic", "applications": [ { "path": "/lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/cfg80211.ko", "sha256": "d2f4c7829dc52505c2f02f91e411e84596c2056b86654a064acdc9f95fc52bca", "sha1": "98a9a080b7896639f0db8a616fa57c06c5cf5d46", "md5": "8b7b6b2d5feaadb8a1fc151e133d1f08", "name": "cfg80211.ko", "size": 1604969, "description": null, "package": 4941740, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-02T11:17:35+00:00", "updated_at": "2022-12-02T11:17:35+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/iwlwifi.ko", "sha256": "4318877bc15982e48a520ab6ce4d7973907f0b5ec94051c9a2a5806006aa3fbc", "sha1": "85b24432301b8508c15226bdfbb9b8615255c8f4", "md5": "00dc4de81750c261eb6aea545fd3f1bc", "name": "iwlwifi.ko", "size": 948993, "description": null, "package": 4941740, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-02T11:17:35+00:00", "updated_at": "2022-12-02T11:17:35+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/compat.ko", "sha256": "86063c95c31600696a19394a8eb1b3992d646c3157a4b1609c27dd5af67ff201", "sha1": "2acf423d11a6f9d2700606751528c68280aefaf9", "md5": "3f3d750ac9f152cafbdd6919d7ad8222", "name": "compat.ko", "size": 8529, "description": null, "package": 4941740, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-02T11:17:35+00:00", "updated_at": "2022-12-02T11:17:35+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/mac80211.ko", "sha256": "ba9df94e3e77725d08b6a9bf66d2399afc2857be818bdf99202659326a34e31b", "sha1": "4cd95842519455589b78dddd350e02e3fc26f0c6", "md5": "8c22184b4003e88affbe3bebc43bca7f", "name": "mac80211.ko", "size": 2053137, "description": null, "package": 4941740, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-02T11:17:35+00:00", "updated_at": "2022-12-02T11:17:35+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/iwlmvm.ko", "sha256": "fc671ef7fdeea01fedac861d61a33f852d52e206f47ac80b3b2889b8b2237c84", "sha1": "45040221b135336eafb430e3242dc41a743a939c", "md5": "bd01533cbf3f99862ea57b4344e09d44", "name": "iwlmvm.ko", "size": 1218737, "description": null, "package": 4941740, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-02T11:17:35+00:00", "updated_at": "2022-12-02T11:17:35+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-56-generic/ubuntu/iwlwifi/iwlxvt.ko", "sha256": "77c33e991af6a666daae18179647fa698f381de702712e20fe1e34cffe44f8ad", "sha1": "7c10b5be4b5c37b886a1345d1f0a4e845c1ab228", "md5": "296a00abaaade4a8df770cbd36633ed0", "name": "iwlxvt.ko", "size": 128473, "description": null, "package": 4941740, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-02T11:17:35+00:00", "updated_at": "2022-12-02T11:17:35+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3649", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T11:41:20+00:00", "updated_at": "2023-01-07T11:41:20+00:00" }, { "name": "CVE-2022-0171", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T11:55:30+00:00", "updated_at": "2023-01-07T11:55:30+00:00" }, { "name": "CVE-2022-2663", "risk": 53, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T11:58:20+00:00", "updated_at": "2023-01-07T11:58:20+00:00" }, { "name": "CVE-2022-3646", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T12:24:02+00:00", "updated_at": "2023-01-07T12:24:02+00:00" }, { "name": "CVE-2022-3061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T13:01:07+00:00", "updated_at": "2023-01-07T13:01:07+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T13:44:03+00:00", "updated_at": "2023-01-07T13:44:03+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T14:23:13+00:00", "updated_at": "2023-01-07T14:23:13+00:00" }, { "name": "CVE-2022-43750", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T14:47:29+00:00", "updated_at": "2023-01-07T14:47:29+00:00" }, { "name": "CVE-2022-20421", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T14:50:03+00:00", "updated_at": "2023-01-07T14:50:03+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T15:08:36+00:00", "updated_at": "2023-01-07T15:08:36+00:00" }, { "name": "CVE-2022-39842", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T15:34:26+00:00", "updated_at": "2023-01-07T15:34:26+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T15:37:01+00:00", "updated_at": "2023-01-07T15:37:01+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "958fd78e797c542d9ee2045727a59b82f968c7a18053d5779a1e77b4ef766da2", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_i386.deb" }, "created_at": "2023-01-07T15:37:28+00:00", "updated_at": "2023-01-07T15:37:28+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:26:43+00:00", "updated_at": "2023-01-08T10:26:43+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:31:40+00:00", "updated_at": "2023-01-08T10:31:40+00:00" }, { "name": "CVE-2022-3649", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:35:59+00:00", "updated_at": "2023-01-08T10:35:59+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:36:11+00:00", "updated_at": "2023-01-08T10:36:11+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:43:35+00:00", "updated_at": "2023-01-08T10:43:35+00:00" }, { "name": "CVE-2022-2663", "risk": 53, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:44:05+00:00", "updated_at": "2023-01-08T10:44:05+00:00" }, { "name": "CVE-2022-3646", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:44:22+00:00", "updated_at": "2023-01-08T10:44:22+00:00" }, { "name": "CVE-2022-3061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:48:42+00:00", "updated_at": "2023-01-08T10:48:42+00:00" }, { "name": "CVE-2022-39842", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:55:21+00:00", "updated_at": "2023-01-08T10:55:21+00:00" }, { "name": "CVE-2022-20421", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T10:56:40+00:00", "updated_at": "2023-01-08T10:56:40+00:00" }, { "name": "CVE-2022-43750", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T11:00:37+00:00", "updated_at": "2023-01-08T11:00:37+00:00" }, { "name": "CVE-2022-0171", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T11:00:48+00:00", "updated_at": "2023-01-08T11:00:48+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-08T11:02:58+00:00", "updated_at": "2023-01-08T11:02:58+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:45:58+00:00", "updated_at": "2023-01-13T10:45:58+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:52:55+00:00", "updated_at": "2023-01-13T10:52:55+00:00" }, { "name": "CVE-2022-4378", "risk": 8, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:53:52+00:00", "updated_at": "2023-01-13T10:53:52+00:00" }, { "name": "CVE-2022-3643", "risk": 10, "source": "USN", "sid": null, "fixed": null, "created_at": "2023-01-13T10:55:24+00:00", "updated_at": "2023-01-13T10:55:24+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "744b4dc46aba668ac5b15db3983269a1ff078feb0b07772f2314089d932416f8", "name": "linux-libc-dev", "version": "5.15.0-58.64", "filename": "linux-libc-dev_5.15.0-58.64_amd64.deb" }, "created_at": "2023-01-14T10:26:08+00:00", "updated_at": "2023-01-14T10:26:08+00:00" }, { "name": "CVE-2022-42896", "risk": 9, "source": "USN", "sid": null, "fixed": { "sha256": "744b4dc46aba668ac5b15db3983269a1ff078feb0b07772f2314089d932416f8", "name": "linux-libc-dev", "version": "5.15.0-58.64", "filename": "linux-libc-dev_5.15.0-58.64_amd64.deb" }, "created_at": "2023-01-14T10:26:23+00:00", "updated_at": "2023-01-14T10:26:23+00:00" }, { "name": "CVE-2022-4378", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "744b4dc46aba668ac5b15db3983269a1ff078feb0b07772f2314089d932416f8", "name": "linux-libc-dev", "version": "5.15.0-58.64", "filename": "linux-libc-dev_5.15.0-58.64_amd64.deb" }, "created_at": "2023-01-14T10:26:32+00:00", "updated_at": "2023-01-14T10:26:32+00:00" }, { "name": "CVE-2022-3643", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "744b4dc46aba668ac5b15db3983269a1ff078feb0b07772f2314089d932416f8", "name": "linux-libc-dev", "version": "5.15.0-58.64", "filename": "linux-libc-dev_5.15.0-58.64_amd64.deb" }, "created_at": "2023-01-14T10:26:44+00:00", "updated_at": "2023-01-14T10:26:44+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-02-18T11:46:01+00:00", "updated_at": "2023-02-18T11:46:01+00:00" }, { "name": "CVE-2022-42432", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-04-21T09:24:10+00:00", "updated_at": "2023-04-21T09:24:10+00:00" }, { "name": "CVE-2022-2308", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-04-21T09:29:05+00:00", "updated_at": "2023-04-21T09:29:05+00:00" }, { "name": "CVE-2022-3903", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-04-21T09:37:07+00:00", "updated_at": "2023-04-21T09:37:07+00:00" }, { "name": "CVE-2023-2860", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-07-12T10:07:44+00:00", "updated_at": "2023-07-12T10:07:44+00:00" } ], "risk": 100, "vulnerable": 100, "outdated": 100, "malicious": 0, "created_at": "2022-11-22T21:16:12+00:00", "updated_at": "2022-12-02T11:17:34+00:00", "deleted_at": null }