Zercurity data services
  • Summary
  • Applications (0)
  • Packages (3)
  • Vulnerabilities (0)

snd-soc-sst-bdw-rt5677-mach.ko

Hashes
  • SHA256: 500f068308da0dbc3c6db5dee78888ac6afd87aa0499c7b801d662db7c96175e
  • SHA1: ffdf5a5f2df37bc142185efb53c26947413f4f50
  • MD5: b64768aa90603206f126de48e09cdc1f
Information
  • Package: linux-image-4.19.0-0.bpo.5-686-pae-unsigned
  • Size: 12448
  • Platform: LINUX

Packages

NameTypeArchSizeRisk
linux-image-4.19.0-0.bpo.5-686-pae-unsigned
linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-4~bpo9+1_i386.deb
DEBI3861460390
linux-image-4.19.0-0.bpo.5-686-pae-unsigned
linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-3~bpo9+1_i386.deb
DEBI3861460370
linux-image-4.19.0-0.bpo.5-686-pae-unsigned
linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-5+deb10u2~bpo9+1_i386.deb
DEBI38614604293

Raw Object

{
  "sha256": "500f068308da0dbc3c6db5dee78888ac6afd87aa0499c7b801d662db7c96175e",
  "sha1": "ffdf5a5f2df37bc142185efb53c26947413f4f50",
  "md5": "b64768aa90603206f126de48e09cdc1f",
  "name": "snd-soc-sst-bdw-rt5677-mach.ko",
  "size": 12448,
  "description": null,
  "package": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned",
  "platform": "LINUX",
  "risk": 0,
  "vulnerable": null,
  "outdated": null,
  "malicious": null,
  "packages": [
    {
      "uuid": "487ce2f3-55ea-23e0-d9c0-b303847b2666",
      "path": "/lib/modules/4.19.0-0.bpo.5-686-pae/kernel/sound/soc/intel/boards/snd-soc-sst-bdw-rt5677-mach.ko",
      "sha256": "112349f8a04c9c15c262b7e31c050adb3852793a9f9e4ec4f9cc904b82b34672",
      "sha1": "15d050b7965adb4ce2607c65b31607a3406859fd",
      "md5": "b15c3750ee434b96575e1c34ae317f51",
      "type": "DEB",
      "arch": "I386",
      "name": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned",
      "filename": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-4~bpo9+1_i386.deb",
      "size": 146039,
      "description": "Linux 4.19 for modern PCs\nThe Linux kernel 4.19 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.",
      "url": "https://www.kernel.org/",
      "version": "4.19.37-4~bpo9+1",
      "source": "linux",
      "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
      "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T11:38:13+00:00",
      "updated_at": "2021-03-07T11:38:13+00:00",
      "deleted_at": null
    },
    {
      "uuid": "3eade232-fdfe-9520-1396-bf0ceebcb29a",
      "path": "/lib/modules/4.19.0-0.bpo.5-686-pae/kernel/sound/soc/intel/boards/snd-soc-sst-bdw-rt5677-mach.ko",
      "sha256": "b6f086546ea773da9c057dc58b2bf99533358b43b29b14e83eb51a2f7431e8ca",
      "sha1": "25216c5894942f0f52987e8f4dd02604a1e63e7b",
      "md5": "fe4ff0820a53fd46f32ce590b57d12da",
      "type": "DEB",
      "arch": "I386",
      "name": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned",
      "filename": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-3~bpo9+1_i386.deb",
      "size": 146037,
      "description": "Linux 4.19 for modern PCs\nThe Linux kernel 4.19 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.",
      "url": "https://www.kernel.org/",
      "version": "4.19.37-3~bpo9+1",
      "source": "linux",
      "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
      "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T18:47:40+00:00",
      "updated_at": "2021-03-07T18:47:40+00:00",
      "deleted_at": null
    },
    {
      "uuid": "e4ad4ab0-d103-32a8-53a8-d7cd88ea9c01",
      "path": "/lib/modules/4.19.0-0.bpo.5-686-pae/kernel/sound/soc/intel/boards/snd-soc-sst-bdw-rt5677-mach.ko",
      "sha256": "bf2bcb80c1322b12f0a1cccdc02a40929fbe95702a323f9a75fca47aaedee7b8",
      "sha1": "54094d1d0ca23c741bd90dfc60692345e636efcb",
      "md5": "f42803405e503b57a818063d0c705dd0",
      "type": "DEB",
      "arch": "I386",
      "name": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned",
      "filename": "linux-image-4.19.0-0.bpo.5-686-pae-unsigned_4.19.37-5+deb10u2~bpo9+1_i386.deb",
      "size": 146042,
      "description": "Linux 4.19 for modern PCs\nThe Linux kernel 4.19 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.",
      "url": "https://www.kernel.org/",
      "version": "4.19.37-5+deb10u2~bpo9+1",
      "source": "linux",
      "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
      "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool",
      "risk": 93,
      "vulnerable": 93,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T19:33:32+00:00",
      "updated_at": "2021-03-07T19:33:32+00:00",
      "deleted_at": null
    }
  ],
  "created_at": "2019-08-16T16:11:27+00:00",
  "updated_at": "2019-08-16T16:11:27+00:00",
  "deleted_at": null
}