d1497be14417e0c111ba4b14c44224a342fb2ff735c68ff62079cf25a01aa045
c9e3cf59e432931a23903f5b098bbd4d57c6bf8d
35f12c49f3d6b677771f3f7f8cb87aee
linux-image-extra-4.4.0-138-generic
16294
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-extra-4.4.0-138-generic linux-image-extra-4.4.0-138-generic_4.4.0-138.164_i386.deb | DEB | I386 | 112265 | 71 |
{ "sha256": "d1497be14417e0c111ba4b14c44224a342fb2ff735c68ff62079cf25a01aa045", "sha1": "c9e3cf59e432931a23903f5b098bbd4d57c6bf8d", "md5": "35f12c49f3d6b677771f3f7f8cb87aee", "name": "tsc200x-core.ko", "size": 16294, "description": null, "package": "linux-image-extra-4.4.0-138-generic", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "adcf4575-4e02-f669-065d-f3c5bf0456e5", "path": "/lib/modules/4.4.0-138-generic/kernel/drivers/input/touchscreen/tsc200x-core.ko", "sha256": "2f9227f9d94ad111a46eaaa491ee75add0312fef2734f74699c6ecf944346ba0", "sha1": "71f6204261acb8efdaed13788ce17a7957296181", "md5": "5f78d102fece69d9ae23b40b46b3411b", "type": "DEB", "arch": "I386", "name": "linux-image-extra-4.4.0-138-generic", "filename": "linux-image-extra-4.4.0-138-generic_4.4.0-138.164_i386.deb", "size": 112265, "description": "Linux kernel extra modules for version 4.4.0 on 32 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.4.0 on\n32 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.4.0-138.164", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.4.0-138-generic, crda | wireless-crda", "risk": 71, "vulnerable": 71, "outdated": null, "malicious": null, "created_at": "2021-03-20T23:21:41+00:00", "updated_at": "2021-03-20T23:21:41+00:00", "deleted_at": null } ], "created_at": "2018-10-03T20:48:27+00:00", "updated_at": "2018-10-03T20:48:27+00:00", "deleted_at": null }