8c8189490b168bff430028368517fb756395636eec0fa12542ead9c3bcdf5c25
9dae51c9086c27257de859d23afc3149131e3502
e26d5186c30174d401fb464c498a52a5
5.15.0-46.49
linux-modules-iwlwifi-5.15.0-46-generic_5.15.0-46.49_amd64.deb
6173
DEB
linux
AMD64
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
linux-image-5.15.0-46-generic | linux-image-unsigned-5.15.0-46-generic
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
cfg80211.ko /lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/cfg80211.ko | 1604705 | 0 | ||
iwlwifi.ko /lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/iwlwifi.ko | 948601 | 0 | ||
compat.ko /lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/compat.ko | 8521 | 0 | ||
mac80211.ko /lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/mac80211.ko | 2052089 | 0 | ||
iwlmvm.ko /lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/iwlmvm.ko | 1218305 | 0 | ||
iwlxvt.ko /lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/iwlxvt.ko | 128513 | 0 |
{ "sha256": "8c8189490b168bff430028368517fb756395636eec0fa12542ead9c3bcdf5c25", "sha1": "9dae51c9086c27257de859d23afc3149131e3502", "md5": "e26d5186c30174d401fb464c498a52a5", "type": "DEB", "arch": "AMD64", "name": "linux-modules-iwlwifi-5.15.0-46-generic", "filename": "linux-modules-iwlwifi-5.15.0-46-generic_5.15.0-46.49_amd64.deb", "size": 6173, "description": "Linux kernel iwlwifi modules for version 5.15.0-46\nThis package provides the Linux kernel iwlwifi modules for version\n5.15.0-46.\n\nYou likely do not want to install this package directly. Instead, install the\none of the linux-modules-iwlwifi-generic* meta-packages,\nwhich will ensure that upgrades work correctly, and that supporting packages are\nalso installed.", "url": null, "version": "5.15.0-46.49", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-5.15.0-46-generic | linux-image-unsigned-5.15.0-46-generic", "applications": [ { "path": "/lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/cfg80211.ko", "sha256": "cf9e8bc9da9e05c6cbf745bf91b880440b02a64f5f9bb2881c9001d62f5d2d07", "sha1": "fbc342314840afefb14a71b4d9cda8898b1244ea", "md5": "36245fa52b1b76ce89392de240f17b61", "name": "cfg80211.ko", "size": 1604705, "description": null, "package": 3904433, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:09:06+00:00", "updated_at": "2022-08-10T04:09:06+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/iwlwifi.ko", "sha256": "3274c34de1a20dc86ebdb12bc8969632b787daade9f68edaa11b46ea945cc94b", "sha1": "dad3d95d2ed833af012b21762b3a8c7b7f8f1695", "md5": "986996c6cfd021b597b656511869a6ce", "name": "iwlwifi.ko", "size": 948601, "description": null, "package": 3904433, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:09:06+00:00", "updated_at": "2022-08-10T04:09:06+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/compat.ko", "sha256": "68d9a2adf390a21226f53e3b74ecb6a61f30becef564e4a673f4446c41547929", "sha1": "90ffed26422b8f7807c567a11724bf083844e459", "md5": "8fc8a74e1394a35f128d0aef9762e8d6", "name": "compat.ko", "size": 8521, "description": null, "package": 3904433, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:09:06+00:00", "updated_at": "2022-08-10T04:09:06+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/mac80211.ko", "sha256": "b200c2bfe5548fcce53ba5fb618cee253bc2c59d61739b3c9d0f68b4ee02d698", "sha1": "f61be293d3566569c74a6293e362f700386167d9", "md5": "082866859327b17d5e197693884021af", "name": "mac80211.ko", "size": 2052089, "description": null, "package": 3904433, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:09:07+00:00", "updated_at": "2022-08-10T04:09:07+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/iwlmvm.ko", "sha256": "fd13bfbd9f40a1ef2f901d5b4c622297529f22ab103707d4870f4dbdff37ab71", "sha1": "e5f6cd3e460043428341e82d0600fdb8ee64ea9b", "md5": "668dbe5254e0a1fdc53ad74e55360834", "name": "iwlmvm.ko", "size": 1218305, "description": null, "package": 3904433, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:09:07+00:00", "updated_at": "2022-08-10T04:09:07+00:00", "deleted_at": null }, { "path": "/lib/modules/5.15.0-46-generic/ubuntu/iwlwifi/iwlxvt.ko", "sha256": "0a1dda0fbf9e71fefb132da4047439220ebd955a302f4eda26ef7cea4671cf33", "sha1": "2fb2363e88c4050180892917d1ff06a42aa2f879", "md5": "4c995c916c65ba5b056e060fda14bcd7", "name": "iwlxvt.ko", "size": 128513, "description": null, "package": 3904433, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-08-10T04:09:07+00:00", "updated_at": "2022-08-10T04:09:07+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33061", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T16:14:19+00:00", "updated_at": "2022-09-16T16:14:19+00:00" }, { "name": "CVE-2022-1973", "risk": 71, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T16:55:04+00:00", "updated_at": "2022-09-16T16:55:04+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T16:55:12+00:00", "updated_at": "2022-09-16T16:55:12+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T16:55:22+00:00", "updated_at": "2022-09-16T16:55:22+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T17:06:54+00:00", "updated_at": "2022-09-16T17:06:54+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T17:07:30+00:00", "updated_at": "2022-09-16T17:07:30+00:00" }, { "name": "CVE-2022-1943", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T17:11:12+00:00", "updated_at": "2022-09-16T17:11:12+00:00" }, { "name": "CVE-2022-2873", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T17:12:47+00:00", "updated_at": "2022-09-16T17:12:47+00:00" }, { "name": "CVE-2022-2959", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2022-09-16T17:12:59+00:00", "updated_at": "2022-09-16T17:12:59+00:00" }, { "name": "CVE-2022-42720", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744", "name": "linux-libc-dev", "version": "5.15.0-52.58", "filename": "linux-libc-dev_5.15.0-52.58_i386.deb" }, "created_at": "2022-10-20T17:09:58+00:00", "updated_at": "2022-10-20T17:09:58+00:00" }, { "name": "CVE-2022-42719", "risk": 88, "source": "USN", "sid": null, "fixed": { "sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744", "name": "linux-libc-dev", "version": "5.15.0-52.58", "filename": "linux-libc-dev_5.15.0-52.58_i386.deb" }, "created_at": "2022-10-20T17:25:04+00:00", "updated_at": "2022-10-20T17:25:04+00:00" }, { "name": "CVE-2022-42721", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744", "name": "linux-libc-dev", "version": "5.15.0-52.58", "filename": "linux-libc-dev_5.15.0-52.58_i386.deb" }, "created_at": "2022-10-20T18:10:38+00:00", "updated_at": "2022-10-20T18:10:38+00:00" }, { "name": "CVE-2022-41674", "risk": 81, "source": "USN", "sid": null, "fixed": { "sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744", "name": "linux-libc-dev", "version": "5.15.0-52.58", "filename": "linux-libc-dev_5.15.0-52.58_i386.deb" }, "created_at": "2022-10-20T18:33:15+00:00", "updated_at": "2022-10-20T18:33:15+00:00" }, { "name": "CVE-2022-42722", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744", "name": "linux-libc-dev", "version": "5.15.0-52.58", "filename": "linux-libc-dev_5.15.0-52.58_i386.deb" }, "created_at": "2022-10-20T18:46:21+00:00", "updated_at": "2022-10-20T18:46:21+00:00" }, { "name": "CVE-2022-2602", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "27ced603e73af7ebfd1310f200ae7403ce3ab56705267dcae44556754a3a1744", "name": "linux-libc-dev", "version": "5.15.0-52.58", "filename": "linux-libc-dev_5.15.0-52.58_i386.deb" }, "created_at": "2022-10-20T19:23:36+00:00", "updated_at": "2022-10-20T19:23:36+00:00" }, { "name": "CVE-2022-32296", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-01-28T17:42:55+00:00", "updated_at": "2023-01-28T17:42:55+00:00" }, { "name": "CVE-2022-3077", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-01-28T22:58:49+00:00", "updated_at": "2023-01-28T22:58:49+00:00" }, { "name": "CVE-2022-3577", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-01-29T16:10:29+00:00", "updated_at": "2023-01-29T16:10:29+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-03-07T11:46:23+00:00", "updated_at": "2023-03-07T11:46:23+00:00" }, { "name": "CVE-2022-3115", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-03-07T12:09:18+00:00", "updated_at": "2023-03-07T12:09:18+00:00" }, { "name": "CVE-2023-1838", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-04-21T09:27:13+00:00", "updated_at": "2023-04-21T09:27:13+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-04-21T09:33:02+00:00", "updated_at": "2023-04-21T09:33:02+00:00" }, { "name": "CVE-2023-4387", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-09-13T09:51:00+00:00", "updated_at": "2023-09-13T09:51:00+00:00" }, { "name": "CVE-2023-4459", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-09-13T10:29:06+00:00", "updated_at": "2023-09-13T10:29:06+00:00" }, { "name": "CVE-2023-4385", "risk": 6, "source": "USN", "sid": null, "fixed": { "sha256": "cbc62b5c93260c5c6494759e12df8d4194085acd63e2a4b2eb975803b9483ee1", "name": "linux-libc-dev", "version": "5.15.0-47.51", "filename": "linux-libc-dev_5.15.0-47.51_i386.deb" }, "created_at": "2023-09-13T10:59:46+00:00", "updated_at": "2023-09-13T10:59:46+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-08-09T22:32:33+00:00", "updated_at": "2022-08-10T03:09:06+00:00", "deleted_at": null }