549e275c43d398b48418f57946aa55a749ff400a8b55bab712ccb0a919d63331
cf067fa0025d32d97c86aa2d9fab34a3aeb8d52b
90cfa5c6ebf9abe389c3c62611207c29
5.15.0-54.60
linux-modules-iwlwifi-5.15.0-54-generic_5.15.0-54.60_amd64.deb
6273
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
linux-image-5.15.0-54-generic | linux-image-unsigned-5.15.0-54-generic
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
cfg80211.ko /lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/cfg80211.ko | 1605409 | 0 | ||
iwlwifi.ko /lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlwifi.ko | 948993 | 0 | ||
compat.ko /lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/compat.ko | 8529 | 0 | ||
mac80211.ko /lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/mac80211.ko | 2052953 | 0 | ||
iwlmvm.ko /lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlmvm.ko | 1218737 | 0 | ||
iwlxvt.ko /lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlxvt.ko | 128473 | 0 |
{ "sha256": "549e275c43d398b48418f57946aa55a749ff400a8b55bab712ccb0a919d63331", "sha1": "cf067fa0025d32d97c86aa2d9fab34a3aeb8d52b", "md5": "90cfa5c6ebf9abe389c3c62611207c29", "type": "DEB", "arch": "AMD64", "name": "linux-modules-iwlwifi-5.15.0-54-generic", "filename": "linux-modules-iwlwifi-5.15.0-54-generic_5.15.0-54.60_amd64.deb", "size": 6273, "description": "Linux kernel iwlwifi modules for version 5.15.0-54\nThis package provides the Linux kernel iwlwifi modules for version\n5.15.0-54.\n\nYou likely do not want to install this package directly. Instead, install the\none of the linux-modules-iwlwifi-generic* meta-packages,\nwhich will ensure that upgrades work correctly, and that supporting packages are\nalso installed.", "url": null, "version": "5.15.0-54.60", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-5.15.0-54-generic | linux-image-unsigned-5.15.0-54-generic", "applications": [ { "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/cfg80211.ko", "sha256": "e6026c3368fa7f1ab40430a8cddc4da3d18381f4c505b7c7e60d4322badc194d", "sha1": "4e57bbe972638e8cc68e5b22d9df7e287df5556d", "md5": "572966a34996d683c1da88fbb4dc62cb", "name": "cfg80211.ko", "size": 1605409, "description": null, "package": 4907217, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:34+00:00", "updated_at": "2022-11-17T10:21:34+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlwifi.ko", "sha256": "7980f0fa4a0595cfcb9e5572815b53be6d48d32ca5043acccd8342de5167b1dd", "sha1": "ebd506e4ebc885c4bce324eefbfe7688adb08c0e", "md5": "8545ef9b59951a958241ecf3e238b4d8", "name": "iwlwifi.ko", "size": 948993, "description": null, "package": 4907217, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:34+00:00", "updated_at": "2022-11-17T10:21:34+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/compat.ko", "sha256": "fe3426fba1ed2a772e9b31f7f6ac6a135b2d6f9ffd59189498c7b71d3d648c5a", "sha1": "441c2b1032d960b03e907b2ce66d66191e24f7f3", "md5": "e2e4d44e6849c1dd8ea2457d6d4ebaaa", "name": "compat.ko", "size": 8529, "description": null, "package": 4907217, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:34+00:00", "updated_at": "2022-11-17T10:21:34+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/mac80211.ko", "sha256": "0cced7326d21035e2b3b32bfe0e8c0832eb56fe5125e866164744d7487264378", "sha1": "74d55a2b7923f4de0266cde0033552cbcc38c10d", "md5": "f67336a3814bbe75d8eac482ab2523bd", "name": "mac80211.ko", "size": 2052953, "description": null, "package": 4907217, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:34+00:00", "updated_at": "2022-11-17T10:21:34+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlmvm.ko", "sha256": "6952aa9b8417340876bf55e12e8ab690fdeca08bc0b0baa490cadf6266e1280e", "sha1": "9175a4b1b4da6ec463af264d31d60aba00a01d61", "md5": "888f4c01c2e800b37996e0915b70bbbc", "name": "iwlmvm.ko", "size": 1218737, "description": null, "package": 4907217, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:34+00:00", "updated_at": "2022-11-17T10:21:34+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-54-generic/ubuntu/iwlwifi/iwlxvt.ko", "sha256": "a3065b6c4562d9a47b3375dc897aef4793c05f99cd0b994a4b896ea8ef63553e", "sha1": "bf0de7355f71ffef2a596825de8084732a3f000e", "md5": "da0dff82b9fbe7928d040b6474bc1c5b", "name": "iwlxvt.ko", "size": 128473, "description": null, "package": 4907217, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-11-17T10:21:34+00:00", "updated_at": "2022-11-17T10:21:34+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:27:37+00:00", "updated_at": "2022-12-02T12:27:37+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:37:57+00:00", "updated_at": "2022-12-02T12:37:57+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:39:49+00:00", "updated_at": "2022-12-02T12:39:49+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:41:44+00:00", "updated_at": "2022-12-02T12:41:44+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:42:30+00:00", "updated_at": "2022-12-02T12:42:30+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:43:18+00:00", "updated_at": "2022-12-02T12:43:18+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:44:22+00:00", "updated_at": "2022-12-02T12:44:22+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:45:48+00:00", "updated_at": "2022-12-02T12:45:48+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "48f58d22d1258e9beace201668f992e655cfd573d69c4bc42c2147e28f2f4544", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_i386.deb" }, "created_at": "2022-12-02T12:46:27+00:00", "updated_at": "2022-12-02T12:46:27+00:00" }, { "name": "CVE-2022-3524", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:39:05+00:00", "updated_at": "2022-12-03T12:39:05+00:00" }, { "name": "CVE-2022-42703", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:41:06+00:00", "updated_at": "2022-12-03T12:41:06+00:00" }, { "name": "CVE-2022-3565", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:41:45+00:00", "updated_at": "2022-12-03T12:41:45+00:00" }, { "name": "CVE-2022-3621", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:42:50+00:00", "updated_at": "2022-12-03T12:42:50+00:00" }, { "name": "CVE-2022-3567", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:43:27+00:00", "updated_at": "2022-12-03T12:43:27+00:00" }, { "name": "CVE-2022-3594", "risk": 75, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:44:22+00:00", "updated_at": "2022-12-03T12:44:22+00:00" }, { "name": "CVE-2022-43945", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:44:40+00:00", "updated_at": "2022-12-03T12:44:40+00:00" }, { "name": "CVE-2022-3566", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:45:05+00:00", "updated_at": "2022-12-03T12:45:05+00:00" }, { "name": "CVE-2022-3564", "risk": 80, "source": "USN", "sid": null, "fixed": { "sha256": "5fdffc334592aa2b1a5aabf7b5fec7b1a00063823345bdb3413a8c29c28a38f6", "name": "linux-libc-dev", "version": "5.15.0-56.62", "filename": "linux-libc-dev_5.15.0-56.62_amd64.deb" }, "created_at": "2022-12-03T12:45:43+00:00", "updated_at": "2022-12-03T12:45:43+00:00" }, { "name": "CVE-2022-3649", "risk": 10, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T11:41:21+00:00", "updated_at": "2023-01-07T11:41:21+00:00" }, { "name": "CVE-2022-0171", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T11:55:32+00:00", "updated_at": "2023-01-07T11:55:32+00:00" }, { "name": "CVE-2022-2663", "risk": 53, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T11:58:21+00:00", "updated_at": "2023-01-07T11:58:21+00:00" }, { "name": "CVE-2022-3646", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T12:24:03+00:00", "updated_at": "2023-01-07T12:24:03+00:00" }, { "name": "CVE-2022-3061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T13:01:08+00:00", "updated_at": "2023-01-07T13:01:08+00:00" }, { "name": "CVE-2022-39188", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T13:44:05+00:00", "updated_at": "2023-01-07T13:44:05+00:00" }, { "name": "CVE-2022-3586", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T14:23:14+00:00", "updated_at": "2023-01-07T14:23:14+00:00" }, { "name": "CVE-2022-43750", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T14:47:30+00:00", "updated_at": "2023-01-07T14:47:30+00:00" }, { "name": "CVE-2022-20421", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T14:50:04+00:00", "updated_at": "2023-01-07T14:50:04+00:00" }, { "name": "CVE-2022-40307", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T15:08:37+00:00", "updated_at": "2023-01-07T15:08:37+00:00" }, { "name": "CVE-2022-39842", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T15:34:27+00:00", "updated_at": "2023-01-07T15:34:27+00:00" }, { "name": "CVE-2022-3303", "risk": 47, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T15:37:02+00:00", "updated_at": "2023-01-07T15:37:02+00:00" }, { "name": "CVE-2022-4095", "risk": 8, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-01-07T15:37:29+00:00", "updated_at": "2023-01-07T15:37:29+00:00" }, { "name": "CVE-2022-4662", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-02-18T11:46:01+00:00", "updated_at": "2023-02-18T11:46:01+00:00" }, { "name": "CVE-2022-42432", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-04-21T09:24:11+00:00", "updated_at": "2023-04-21T09:24:11+00:00" }, { "name": "CVE-2022-2308", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-04-21T09:29:06+00:00", "updated_at": "2023-04-21T09:29:06+00:00" }, { "name": "CVE-2022-3903", "risk": 5, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-04-21T09:37:07+00:00", "updated_at": "2023-04-21T09:37:07+00:00" }, { "name": "CVE-2023-2860", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "5631d17ae77d4e92946b7566be3cb03a3b3cb5408ca5f5c2615579a379bdbf5d", "name": "linux-libc-dev", "version": "5.15.0-57.63", "filename": "linux-libc-dev_5.15.0-57.63_amd64.deb" }, "created_at": "2023-07-12T10:07:45+00:00", "updated_at": "2023-07-12T10:07:45+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 98, "malicious": 0, "created_at": "2022-11-15T13:59:05+00:00", "updated_at": "2022-11-17T10:21:34+00:00", "deleted_at": null }