Zercurity data services
  • Summary
  • Applications (0)
  • Packages (1)
  • Vulnerabilities (0)

hv_sock.ko

Hashes
  • SHA256: 2df54793f1fc51410b802012d56ea70ac828bc475fc3df6eb87a8fe47244afd4
  • SHA1: 846e5b3fb562355b23373a97da557a4e70e78c59
  • MD5: 23da9f07f8922f29c5b856b4bdd9a4f7
Information
  • Package: linux-image-4.19.0-0.bpo.5-686-pae-unsigned
  • Size: 13240
  • Platform: LINUX

Packages

NameTypeArchSizeRisk
linux-image-4.19.0-0.bpo.5-686-pae-unsigned
linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-5+deb10u2~bpo9+1_i386.deb
DEBI38614604293

Raw Object

{
  "sha256": "2df54793f1fc51410b802012d56ea70ac828bc475fc3df6eb87a8fe47244afd4",
  "sha1": "846e5b3fb562355b23373a97da557a4e70e78c59",
  "md5": "23da9f07f8922f29c5b856b4bdd9a4f7",
  "name": "hv_sock.ko",
  "size": 13240,
  "description": null,
  "package": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned",
  "platform": "LINUX",
  "risk": 0,
  "vulnerable": null,
  "outdated": null,
  "malicious": null,
  "packages": [
    {
      "uuid": "e4ad4ab0-d103-32a8-53a8-d7cd88ea9c01",
      "path": "/lib/modules/4.19.0-0.bpo.5-686-pae/kernel/net/vmw_vsock/hv_sock.ko",
      "sha256": "bf2bcb80c1322b12f0a1cccdc02a40929fbe95702a323f9a75fca47aaedee7b8",
      "sha1": "54094d1d0ca23c741bd90dfc60692345e636efcb",
      "md5": "f42803405e503b57a818063d0c705dd0",
      "type": "DEB",
      "arch": "I386",
      "name": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned",
      "filename": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-5+deb10u2~bpo9+1_i386.deb",
      "size": 146042,
      "description": "Linux 4.19 for modern PCs\nThe Linux kernel 4.19 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.",
      "url": "https://www.kernel.org/",
      "version": "4.19.37-5+deb10u2~bpo9+1",
      "source": "linux",
      "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
      "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool",
      "risk": 93,
      "vulnerable": 93,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T19:34:24+00:00",
      "updated_at": "2021-03-07T19:34:24+00:00",
      "deleted_at": null
    }
  ],
  "created_at": "2019-08-16T16:11:27+00:00",
  "updated_at": "2019-08-16T16:11:27+00:00",
  "deleted_at": null
}