Zercurity data services
  • Summary
  • Applications (0)
  • Packages (2)
  • Vulnerabilities (0)

virtio-rng.ko

Hashes
  • SHA256: 3167510e5b2a50fe11d818024f70657f4d9d42518147b286e59efa688e3a0f68
  • SHA1: ab1ec79eeb2f60e879cf235c47885f2ec61a720b
  • MD5: 99d8337d3a0a5f9a912df51a7c1941bb
Information
  • Package: linux-image-4.9.0-9-686-pae
  • Size: 7184
  • Platform: LINUX

Packages

NameTypeArchSizeRisk
linux-image-4.9.0-9-686-pae
linux-image-4.9.0-9-686-pae_4.9.168-1+deb9u3_i386.deb
DEBI38613835278
linux-image-4.9.0-9-686-pae
linux-image-4.9.0-9-686-pae_4.9.168-1+deb9u4_i386.deb
DEBI38613835293

Raw Object

{
  "sha256": "3167510e5b2a50fe11d818024f70657f4d9d42518147b286e59efa688e3a0f68",
  "sha1": "ab1ec79eeb2f60e879cf235c47885f2ec61a720b",
  "md5": "99d8337d3a0a5f9a912df51a7c1941bb",
  "name": "virtio-rng.ko",
  "size": 7184,
  "description": null,
  "package": "linux-image-4.9.0-9-686-pae",
  "platform": "LINUX",
  "risk": 0,
  "vulnerable": null,
  "outdated": null,
  "malicious": null,
  "packages": [
    {
      "uuid": "f066b35a-0737-244f-1322-1d82667e50b8",
      "path": "/lib/modules/4.9.0-9-686-pae/kernel/drivers/char/hw_random/virtio-rng.ko",
      "sha256": "d7534b7f922ff09fb744ae14f497a659a629ab196b9f7b3786e67980c6771ada",
      "sha1": "aad9ee93411991952eba8eaf0435c112acf7eab1",
      "md5": "d6f2a778dc6d5ee726b3a77056eddcf5",
      "type": "DEB",
      "arch": "I386",
      "name": "linux-image-4.9.0-9-686-pae",
      "filename": "linux-image-4.9.0-9-686-pae_4.9.168-1+deb9u3_i386.deb",
      "size": 138352,
      "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor.  It supports both privileged\n(dom0) and unprivileged (domU) operation.",
      "url": "https://www.kernel.org/",
      "version": "4.9.168-1+deb9u3",
      "source": "linux",
      "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
      "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool",
      "risk": 78,
      "vulnerable": 78,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T18:49:22+00:00",
      "updated_at": "2021-03-07T18:49:22+00:00",
      "deleted_at": null
    },
    {
      "uuid": "17fa2fc3-b7c9-d946-ba76-6ff80d29a01e",
      "path": "/lib/modules/4.9.0-9-686-pae/kernel/drivers/char/hw_random/virtio-rng.ko",
      "sha256": "8722e50f5fb0efc0ac839a50cb7c99ddba2154f635406bafd0f3be73be2f2df2",
      "sha1": "910da0daef601333f2cd2ef4c0140483b4449805",
      "md5": "f0bf5cd8ddc48ac3fc584d6618204635",
      "type": "DEB",
      "arch": "I386",
      "name": "linux-image-4.9.0-9-686-pae",
      "filename": "linux-image-4.9.0-9-686-pae_4.9.168-1+deb9u4_i386.deb",
      "size": 138352,
      "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor.  It supports both privileged\n(dom0) and unprivileged (domU) operation.",
      "url": "https://www.kernel.org/",
      "version": "4.9.168-1+deb9u4",
      "source": "linux",
      "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
      "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool",
      "risk": 93,
      "vulnerable": 93,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T01:23:54+00:00",
      "updated_at": "2021-03-09T01:23:54+00:00",
      "deleted_at": null
    }
  ],
  "created_at": "2019-07-19T12:41:00+00:00",
  "updated_at": "2019-07-19T12:41:00+00:00",
  "deleted_at": null
}