9fd347e81afd5d6431af9dbee28d05d1e96d1a4d74073da2996b84f5245f6872
b0788359fb36ee2ff5846650aed23378552f14e6
c1d224417ce68ded512ea5dd7118a57c
linux-image-extra-4.4.0-138-generic
10902
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-extra-4.4.0-138-generic linux-image-extra-4.4.0-138-generic_4.4.0-138.164_amd64.deb | DEB | AMD64 | 152387 | 71 |
{ "sha256": "9fd347e81afd5d6431af9dbee28d05d1e96d1a4d74073da2996b84f5245f6872", "sha1": "b0788359fb36ee2ff5846650aed23378552f14e6", "md5": "c1d224417ce68ded512ea5dd7118a57c", "name": "cyttsp_spi.ko", "size": 10902, "description": null, "package": "linux-image-extra-4.4.0-138-generic", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "4fc983ab-ec4a-6275-5160-23abd1f3d285", "path": "/lib/modules/4.4.0-138-generic/kernel/drivers/input/touchscreen/cyttsp_spi.ko", "sha256": "6c1942cbf757f5e4ea7224f38c9edc45d55a23c045d6d6b0aaa70d41c26c0bcb", "sha1": "9ff7ffe0eee75aa6d1520ca2aa222b252375c39c", "md5": "c1b6a37b68434f7fb04059caa7531acd", "type": "DEB", "arch": "AMD64", "name": "linux-image-extra-4.4.0-138-generic", "filename": "linux-image-extra-4.4.0-138-generic_4.4.0-138.164_amd64.deb", "size": 152387, "description": "Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.4.0 on\n64 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.4.0-138.164", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.4.0-138-generic, crda | wireless-crda", "risk": 71, "vulnerable": 71, "outdated": null, "malicious": null, "created_at": "2021-03-20T14:43:42+00:00", "updated_at": "2021-03-20T14:43:42+00:00", "deleted_at": null } ], "created_at": "2018-10-02T20:22:45+00:00", "updated_at": "2018-10-02T20:22:45+00:00", "deleted_at": null }