5b746088c82ed530d72a91ac2b97ed91a30ef8e374e612587b5d9869ba48aa41
79ca3ec72e50ce7b3c460364bad3db0d09f2b33e
a02e2500450d3622f2c7b6be43d2d43d
linux-image-extra-4.4.0-138-generic
44306
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-extra-4.4.0-138-generic linux-image-extra-4.4.0-138-generic_4.4.0-138.164_i386.deb | DEB | I386 | 112265 | 71 |
{ "sha256": "5b746088c82ed530d72a91ac2b97ed91a30ef8e374e612587b5d9869ba48aa41", "sha1": "79ca3ec72e50ce7b3c460364bad3db0d09f2b33e", "md5": "a02e2500450d3622f2c7b6be43d2d43d", "name": "cyttsp4_core.ko", "size": 44306, "description": null, "package": "linux-image-extra-4.4.0-138-generic", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "adcf4575-4e02-f669-065d-f3c5bf0456e5", "path": "/lib/modules/4.4.0-138-generic/kernel/drivers/input/touchscreen/cyttsp4_core.ko", "sha256": "2f9227f9d94ad111a46eaaa491ee75add0312fef2734f74699c6ecf944346ba0", "sha1": "71f6204261acb8efdaed13788ce17a7957296181", "md5": "5f78d102fece69d9ae23b40b46b3411b", "type": "DEB", "arch": "I386", "name": "linux-image-extra-4.4.0-138-generic", "filename": "linux-image-extra-4.4.0-138-generic_4.4.0-138.164_i386.deb", "size": 112265, "description": "Linux kernel extra modules for version 4.4.0 on 32 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.4.0 on\n32 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.4.0-138.164", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.4.0-138-generic, crda | wireless-crda", "risk": 71, "vulnerable": 71, "outdated": null, "malicious": null, "created_at": "2021-03-20T23:21:40+00:00", "updated_at": "2021-03-20T23:21:40+00:00", "deleted_at": null } ], "created_at": "2018-10-03T20:48:21+00:00", "updated_at": "2018-10-03T20:48:21+00:00", "deleted_at": null }