9a8112cffe3ba4b2b1c3e0b9a97c8c4e9677e40d6d3004c9e5e2826f48541089
c3125f4f9df63e77adbcb2c94d7afb0423ec3826
fc07c7a296289cb8e0db97f33fe86b02
linux-modules-extra-4.15.0-1006-gcp
12734
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-modules-extra-4.15.0-1006-gcp linux-modules-extra-4.15.0-1006-gcp_4.15.0-1006.6_amd64.deb | DEB | AMD64 | 165802 | 100 |
{ "sha256": "9a8112cffe3ba4b2b1c3e0b9a97c8c4e9677e40d6d3004c9e5e2826f48541089", "sha1": "c3125f4f9df63e77adbcb2c94d7afb0423ec3826", "md5": "fc07c7a296289cb8e0db97f33fe86b02", "name": "gpio_keys_polled.ko", "size": 12734, "description": null, "package": "linux-modules-extra-4.15.0-1006-gcp", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "1af30be6-2304-5d07-254e-74a5314768e3", "path": "/lib/modules/4.15.0-1006-gcp/kernel/drivers/input/keyboard/gpio_keys_polled.ko", "sha256": "e5728d8eac56a58d4761bdb8811a0abe607370ed68f18edd63eb26f388bbb7c5", "sha1": "b122cdaa8b0d539bea96de7e226f1c0b85bd14b9", "md5": "8ce63c05bb7994531a4a778ebd48e654", "type": "DEB", "arch": "AMD64", "name": "linux-modules-extra-4.15.0-1006-gcp", "filename": "linux-modules-extra-4.15.0-1006-gcp_4.15.0-1006.6_amd64.deb", "size": 165802, "description": "Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.15.0 on\n64 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports amd64 processors.\n\nGeared toward GCP/GKE systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-gcp meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.15.0-1006.6", "source": "linux-gcp", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.15.0-1006-gcp, crda | wireless-crda", "risk": 100, "vulnerable": 100, "outdated": null, "malicious": null, "created_at": "2021-03-21T10:52:26+00:00", "updated_at": "2021-03-21T10:52:26+00:00", "deleted_at": null } ], "created_at": "2018-04-24T08:12:25+00:00", "updated_at": "2018-04-24T08:12:25+00:00", "deleted_at": null }