9b1a22fd53fffa8b1f5f7adca5778cb52d17cf64d6c85cbd7987644532a1d31a
67403990f16fadf76486e202b40308cabfd9df89
bf972b958de5cf20e8b9defdf11732e1
linux-image-4.9.0-11-686-pae
32092
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb | DEB | I386 | 138442 | 88 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb | DEB | I386 | 138442 | 0 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb | DEB | I386 | 138443 | 78 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb | DEB | I386 | 138443 | 0 |
{ "sha256": "9b1a22fd53fffa8b1f5f7adca5778cb52d17cf64d6c85cbd7987644532a1d31a", "sha1": "67403990f16fadf76486e202b40308cabfd9df89", "md5": "bf972b958de5cf20e8b9defdf11732e1", "name": "vsock.ko", "size": 32092, "description": null, "package": "linux-image-4.9.0-11-686-pae", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "c38d8345-5563-f05b-75bf-8e7d2a99d730", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/vmw_vsock/vsock.ko", "sha256": "23af7864f624a6aa3863acbd918bb6d85836c9dffa2e92cdfd76c1a33f96ae03", "sha1": "043972b47de07defc7a1f721b71e70a193ba7327", "md5": "967619750c9cc59d91ebdf2ed55d4418", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 88, "vulnerable": 88, "outdated": null, "malicious": null, "created_at": "2021-03-06T09:20:55+00:00", "updated_at": "2021-03-06T09:20:55+00:00", "deleted_at": null }, { "uuid": "58a6e7ea-1d76-7ff0-d422-d716bd4f2e0c", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/vmw_vsock/vsock.ko", "sha256": "930e3bd730e4b0f0e4b0f4fe6a4f5ed91f8045cf700e73ccc0f6180396ad6dcf", "sha1": "8d5cb37b4f4cc422c86c788a0fc83dbf45a6fa62", "md5": "d6e39819128604a92a7975d17917c973", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T14:47:56+00:00", "updated_at": "2021-03-07T14:47:56+00:00", "deleted_at": null }, { "uuid": "737f6121-b02c-8b0d-e5d6-1dd494396bc9", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/vmw_vsock/vsock.ko", "sha256": "b7d05e1c3e6a0575aa99059cb0e9754011ae66389fd9f0d6360d0f2e75daf2dd", "sha1": "adb3fe469253295a7c7e64bd287a39831bd1a0e1", "md5": "10690a94da48a0ad01ce8624c68faeb5", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3+deb9u1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 78, "vulnerable": 78, "outdated": null, "malicious": null, "created_at": "2021-03-14T23:48:24+00:00", "updated_at": "2021-03-14T23:48:24+00:00", "deleted_at": null }, { "uuid": "5b6a473e-6da1-03c3-335b-b539d90d69b6", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/vmw_vsock/vsock.ko", "sha256": "48cd2126661c91121b9211cd2cdcef2d99d2783df60000a6a14e5d88f17cd9dd", "sha1": "536b72267851906e9ef42ed0a0f66a268c702fc8", "md5": "5db1434633cb4e3798928ac591e6b46b", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-17T00:24:57+00:00", "updated_at": "2021-03-17T00:24:57+00:00", "deleted_at": null } ], "created_at": "2019-08-22T21:50:36+00:00", "updated_at": "2019-08-22T21:50:36+00:00", "deleted_at": null }