fea77fbe4d7acde2d4007450d85c30c11507d416f094e2d4d085fedc728f587f
6876281e8f89f504fd2dc4da7508d1f3f6552fad
9a516c8892796dfa43483961b4feff55
linux-image-extra-4.4.0-138-generic
9950
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-extra-4.4.0-138-generic linux-image-extra-4.4.0-138-generic_4.4.0-138.164_amd64.deb | DEB | AMD64 | 152387 | 71 |
{ "sha256": "fea77fbe4d7acde2d4007450d85c30c11507d416f094e2d4d085fedc728f587f", "sha1": "6876281e8f89f504fd2dc4da7508d1f3f6552fad", "md5": "9a516c8892796dfa43483961b4feff55", "name": "dynapro.ko", "size": 9950, "description": null, "package": "linux-image-extra-4.4.0-138-generic", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "4fc983ab-ec4a-6275-5160-23abd1f3d285", "path": "/lib/modules/4.4.0-138-generic/kernel/drivers/input/touchscreen/dynapro.ko", "sha256": "6c1942cbf757f5e4ea7224f38c9edc45d55a23c045d6d6b0aaa70d41c26c0bcb", "sha1": "9ff7ffe0eee75aa6d1520ca2aa222b252375c39c", "md5": "c1b6a37b68434f7fb04059caa7531acd", "type": "DEB", "arch": "AMD64", "name": "linux-image-extra-4.4.0-138-generic", "filename": "linux-image-extra-4.4.0-138-generic_4.4.0-138.164_amd64.deb", "size": 152387, "description": "Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP\nThis package contains the Linux kernel extra modules for version 4.4.0 on\n64 bit x86 SMP.\n\nAlso includes the corresponding System.map file, the modules built by the\npackager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports Generic processors.\n\nGeared toward desktop and server systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-generic meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.", "url": null, "version": "4.4.0-138.164", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "linux-image-4.4.0-138-generic, crda | wireless-crda", "risk": 71, "vulnerable": 71, "outdated": null, "malicious": null, "created_at": "2021-03-20T14:43:42+00:00", "updated_at": "2021-03-20T14:43:42+00:00", "deleted_at": null } ], "created_at": "2018-10-02T20:22:45+00:00", "updated_at": "2018-10-02T20:22:45+00:00", "deleted_at": null }