e949266bcf8f37aaac27a55312a60034b62ac4a2a71809f2c844b2271d797d2a
c7d72dc4ebee9fd3a5e1cd1189507c89d36fbff9
e880af16fdc52c865367dc13286d7d76
linux-modules-extra-4.15.0-63-generic
11160
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-modules-extra-4.15.0-63-generic linux-modules-extra-4.15.0-63-generic_4.15.0-63.72_amd64.deb | DEB | AMD64 | 165580 | 78 |
{ "sha256": "e949266bcf8f37aaac27a55312a60034b62ac4a2a71809f2c844b2271d797d2a", "sha1": "c7d72dc4ebee9fd3a5e1cd1189507c89d36fbff9", "md5": "e880af16fdc52c865367dc13286d7d76", "name": "ni_tiocmd.ko", "size": 11160, "description": null, "package": "linux-modules-extra-4.15.0-63-generic", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "d4d8b518-70a9-f727-6977-0ac6bb9ad623", "path": "/lib/modules/4.15.0-63-generic/kernel/drivers/staging/comedi/drivers/ni_tiocmd.ko", "sha256": "bc5d0a839c9e1d2fa513adad39529f2c1a5c7b62c1338fb5b2a9d6642875937e", "sha1": "8dc9a0fa24f3e0c689d3015e669e4f608b6b4283", "md5": "579a3eaf63d544e79def9876c758f46b", "type": "DEB", "arch": "AMD64", "name": "linux-modules-extra-4.15.0-63-generic", "filename": "linux-modules-extra-4.15.0-63-generic_4.15.0-63.72_amd64.deb", "size": 165580, "description": "Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.15.0 on\n64 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.15.0-63.72", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.15.0-63-generic | linux-image-unsigned-4.15.0-63-generic, crda | wireless-crda", "risk": 78, "vulnerable": 78, "outdated": null, "malicious": null, "created_at": "2021-03-20T10:54:38+00:00", "updated_at": "2021-03-20T10:54:38+00:00", "deleted_at": null } ], "created_at": "2019-09-05T07:22:28+00:00", "updated_at": "2019-09-05T07:22:28+00:00", "deleted_at": null }