3041b16a721c2a57f21ec3d513fb29d4ed0ae178ccfedd86cdc473bd5b9cd967
e6b40ba127128d4bb79946aaa310d3ca167a7056
47ffb2f61469fa96090bb429970d061c
linux-image-4.9.0-11-686-pae
8916
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb | DEB | I386 | 138442 | 88 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb | DEB | I386 | 138442 | 0 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb | DEB | I386 | 138443 | 78 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb | DEB | I386 | 138443 | 0 |
{ "sha256": "3041b16a721c2a57f21ec3d513fb29d4ed0ae178ccfedd86cdc473bd5b9cd967", "sha1": "e6b40ba127128d4bb79946aaa310d3ca167a7056", "md5": "47ffb2f61469fa96090bb429970d061c", "name": "binfmt_aout.ko", "size": 8916, "description": null, "package": "linux-image-4.9.0-11-686-pae", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "c38d8345-5563-f05b-75bf-8e7d2a99d730", "path": "/lib/modules/4.9.0-11-686-pae/kernel/fs/binfmt_aout.ko", "sha256": "23af7864f624a6aa3863acbd918bb6d85836c9dffa2e92cdfd76c1a33f96ae03", "sha1": "043972b47de07defc7a1f721b71e70a193ba7327", "md5": "967619750c9cc59d91ebdf2ed55d4418", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 88, "vulnerable": 88, "outdated": null, "malicious": null, "created_at": "2021-03-06T09:20:03+00:00", "updated_at": "2021-03-06T09:20:03+00:00", "deleted_at": null }, { "uuid": "58a6e7ea-1d76-7ff0-d422-d716bd4f2e0c", "path": "/lib/modules/4.9.0-11-686-pae/kernel/fs/binfmt_aout.ko", "sha256": "930e3bd730e4b0f0e4b0f4fe6a4f5ed91f8045cf700e73ccc0f6180396ad6dcf", "sha1": "8d5cb37b4f4cc422c86c788a0fc83dbf45a6fa62", "md5": "d6e39819128604a92a7975d17917c973", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T14:47:00+00:00", "updated_at": "2021-03-07T14:47:00+00:00", "deleted_at": null }, { "uuid": "737f6121-b02c-8b0d-e5d6-1dd494396bc9", "path": "/lib/modules/4.9.0-11-686-pae/kernel/fs/binfmt_aout.ko", "sha256": "b7d05e1c3e6a0575aa99059cb0e9754011ae66389fd9f0d6360d0f2e75daf2dd", "sha1": "adb3fe469253295a7c7e64bd287a39831bd1a0e1", "md5": "10690a94da48a0ad01ce8624c68faeb5", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3+deb9u1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 78, "vulnerable": 78, "outdated": null, "malicious": null, "created_at": "2021-03-14T23:47:35+00:00", "updated_at": "2021-03-14T23:47:35+00:00", "deleted_at": null }, { "uuid": "5b6a473e-6da1-03c3-335b-b539d90d69b6", "path": "/lib/modules/4.9.0-11-686-pae/kernel/fs/binfmt_aout.ko", "sha256": "48cd2126661c91121b9211cd2cdcef2d99d2783df60000a6a14e5d88f17cd9dd", "sha1": "536b72267851906e9ef42ed0a0f66a268c702fc8", "md5": "5db1434633cb4e3798928ac591e6b46b", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-17T00:24:08+00:00", "updated_at": "2021-03-17T00:24:08+00:00", "deleted_at": null } ], "created_at": "2019-08-22T21:50:36+00:00", "updated_at": "2019-08-22T21:50:36+00:00", "deleted_at": null }