d8bb7603dcfac988bcb7b3c1b7f8b3bce1d0ea6fac72fa94a1e9cc1a18990fd7
afbff0e4cd62ff6d132aa94a0be3658836b00b12
9e5285c366d14f9ed3cbd09959c2ea42
linux-modules-extra-4.15.0-1006-gcp
15350
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-modules-extra-4.15.0-1006-gcp linux-modules-extra-4.15.0-1006-gcp_4.15.0-1006.6_amd64.deb | DEB | AMD64 | 165802 | 100 |
{ "sha256": "d8bb7603dcfac988bcb7b3c1b7f8b3bce1d0ea6fac72fa94a1e9cc1a18990fd7", "sha1": "afbff0e4cd62ff6d132aa94a0be3658836b00b12", "md5": "9e5285c366d14f9ed3cbd09959c2ea42", "name": "auo-pixcir-ts.ko", "size": 15350, "description": null, "package": "linux-modules-extra-4.15.0-1006-gcp", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "1af30be6-2304-5d07-254e-74a5314768e3", "path": "/lib/modules/4.15.0-1006-gcp/kernel/drivers/input/touchscreen/auo-pixcir-ts.ko", "sha256": "e5728d8eac56a58d4761bdb8811a0abe607370ed68f18edd63eb26f388bbb7c5", "sha1": "b122cdaa8b0d539bea96de7e226f1c0b85bd14b9", "md5": "8ce63c05bb7994531a4a778ebd48e654", "type": "DEB", "arch": "AMD64", "name": "linux-modules-extra-4.15.0-1006-gcp", "filename": "linux-modules-extra-4.15.0-1006-gcp_4.15.0-1006.6_amd64.deb", "size": 165802, "description": "Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.15.0 on\n64 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports amd64 processors.\n\nGeared toward GCP/GKE systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-gcp meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.15.0-1006.6", "source": "linux-gcp", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.15.0-1006-gcp, crda | wireless-crda", "risk": 100, "vulnerable": 100, "outdated": null, "malicious": null, "created_at": "2021-03-21T10:52:23+00:00", "updated_at": "2021-03-21T10:52:23+00:00", "deleted_at": null } ], "created_at": "2018-04-24T08:12:25+00:00", "updated_at": "2018-04-24T08:12:25+00:00", "deleted_at": null }