4a272781610a10259c3605d53046e775600a71cd961f7b2255021ab5763cff1e
337135741ff318bdc5637f850553e85f7c31a927
f70fd60ba9ac8c14ae39d59421bb6560
linux-image-extra-4.4.0-138-generic
18998
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-extra-4.4.0-138-generic linux-image-extra-4.4.0-138-generic_4.4.0-138.164_amd64.deb | DEB | AMD64 | 152387 | 71 |
{ "sha256": "4a272781610a10259c3605d53046e775600a71cd961f7b2255021ab5763cff1e", "sha1": "337135741ff318bdc5637f850553e85f7c31a927", "md5": "f70fd60ba9ac8c14ae39d59421bb6560", "name": "ucb1400_ts.ko", "size": 18998, "description": null, "package": "linux-image-extra-4.4.0-138-generic", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "4fc983ab-ec4a-6275-5160-23abd1f3d285", "path": "/lib/modules/4.4.0-138-generic/kernel/drivers/input/touchscreen/ucb1400_ts.ko", "sha256": "6c1942cbf757f5e4ea7224f38c9edc45d55a23c045d6d6b0aaa70d41c26c0bcb", "sha1": "9ff7ffe0eee75aa6d1520ca2aa222b252375c39c", "md5": "c1b6a37b68434f7fb04059caa7531acd", "type": "DEB", "arch": "AMD64", "name": "linux-image-extra-4.4.0-138-generic", "filename": "linux-image-extra-4.4.0-138-generic_4.4.0-138.164_amd64.deb", "size": 152387, "description": "Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.4.0 on\n64 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.4.0-138.164", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.4.0-138-generic, crda | wireless-crda", "risk": 71, "vulnerable": 71, "outdated": null, "malicious": null, "created_at": "2021-03-20T14:43:42+00:00", "updated_at": "2021-03-20T14:43:42+00:00", "deleted_at": null } ], "created_at": "2018-10-02T20:22:45+00:00", "updated_at": "2018-10-02T20:22:45+00:00", "deleted_at": null }