21dc421e4fc25b060a5d50a1f9dee811c89e99aca13c2d750a00ef227f046bbd
9de56c3448d0028adf34a7f51497516411227723
67c41281e5357735195469c5bc12dd1d
linux-image-4.9.0-11-686-pae
11324
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb | DEB | I386 | 138442 | 88 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb | DEB | I386 | 138442 | 0 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb | DEB | I386 | 138443 | 78 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb | DEB | I386 | 138443 | 0 |
{ "sha256": "21dc421e4fc25b060a5d50a1f9dee811c89e99aca13c2d750a00ef227f046bbd", "sha1": "9de56c3448d0028adf34a7f51497516411227723", "md5": "67c41281e5357735195469c5bc12dd1d", "name": "sata_vsc.ko", "size": 11324, "description": null, "package": "linux-image-4.9.0-11-686-pae", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "c38d8345-5563-f05b-75bf-8e7d2a99d730", "path": "/lib/modules/4.9.0-11-686-pae/kernel/drivers/ata/sata_vsc.ko", "sha256": "23af7864f624a6aa3863acbd918bb6d85836c9dffa2e92cdfd76c1a33f96ae03", "sha1": "043972b47de07defc7a1f721b71e70a193ba7327", "md5": "967619750c9cc59d91ebdf2ed55d4418", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 88, "vulnerable": 88, "outdated": null, "malicious": null, "created_at": "2021-03-06T09:20:17+00:00", "updated_at": "2021-03-06T09:20:17+00:00", "deleted_at": null }, { "uuid": "58a6e7ea-1d76-7ff0-d422-d716bd4f2e0c", "path": "/lib/modules/4.9.0-11-686-pae/kernel/drivers/ata/sata_vsc.ko", "sha256": "930e3bd730e4b0f0e4b0f4fe6a4f5ed91f8045cf700e73ccc0f6180396ad6dcf", "sha1": "8d5cb37b4f4cc422c86c788a0fc83dbf45a6fa62", "md5": "d6e39819128604a92a7975d17917c973", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T14:47:16+00:00", "updated_at": "2021-03-07T14:47:16+00:00", "deleted_at": null }, { "uuid": "737f6121-b02c-8b0d-e5d6-1dd494396bc9", "path": "/lib/modules/4.9.0-11-686-pae/kernel/drivers/ata/sata_vsc.ko", "sha256": "b7d05e1c3e6a0575aa99059cb0e9754011ae66389fd9f0d6360d0f2e75daf2dd", "sha1": "adb3fe469253295a7c7e64bd287a39831bd1a0e1", "md5": "10690a94da48a0ad01ce8624c68faeb5", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3+deb9u1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 78, "vulnerable": 78, "outdated": null, "malicious": null, "created_at": "2021-03-14T23:47:48+00:00", "updated_at": "2021-03-14T23:47:48+00:00", "deleted_at": null }, { "uuid": "5b6a473e-6da1-03c3-335b-b539d90d69b6", "path": "/lib/modules/4.9.0-11-686-pae/kernel/drivers/ata/sata_vsc.ko", "sha256": "48cd2126661c91121b9211cd2cdcef2d99d2783df60000a6a14e5d88f17cd9dd", "sha1": "536b72267851906e9ef42ed0a0f66a268c702fc8", "md5": "5db1434633cb4e3798928ac591e6b46b", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-17T00:24:21+00:00", "updated_at": "2021-03-17T00:24:21+00:00", "deleted_at": null } ], "created_at": "2019-08-22T21:50:36+00:00", "updated_at": "2019-08-22T21:50:36+00:00", "deleted_at": null }