a8ea23ea0012c90207d2ea79626ef26a9410517c615fd97f8429c83e0f138fb8
abfe76058faa99916cbb8801b209c311439f987a
3cac66173de46c31885fa09d7d5a324e
linux-image-4.9.0-11-686-pae
15380
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb | DEB | I386 | 138442 | 88 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb | DEB | I386 | 138442 | 0 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb | DEB | I386 | 138443 | 78 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb | DEB | I386 | 138443 | 0 |
{ "sha256": "a8ea23ea0012c90207d2ea79626ef26a9410517c615fd97f8429c83e0f138fb8", "sha1": "abfe76058faa99916cbb8801b209c311439f987a", "md5": "3cac66173de46c31885fa09d7d5a324e", "name": "ip_vti.ko", "size": 15380, "description": null, "package": "linux-image-4.9.0-11-686-pae", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "c38d8345-5563-f05b-75bf-8e7d2a99d730", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/ipv4/ip_vti.ko", "sha256": "23af7864f624a6aa3863acbd918bb6d85836c9dffa2e92cdfd76c1a33f96ae03", "sha1": "043972b47de07defc7a1f721b71e70a193ba7327", "md5": "967619750c9cc59d91ebdf2ed55d4418", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 88, "vulnerable": 88, "outdated": null, "malicious": null, "created_at": "2021-03-06T09:20:56+00:00", "updated_at": "2021-03-06T09:20:56+00:00", "deleted_at": null }, { "uuid": "58a6e7ea-1d76-7ff0-d422-d716bd4f2e0c", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/ipv4/ip_vti.ko", "sha256": "930e3bd730e4b0f0e4b0f4fe6a4f5ed91f8045cf700e73ccc0f6180396ad6dcf", "sha1": "8d5cb37b4f4cc422c86c788a0fc83dbf45a6fa62", "md5": "d6e39819128604a92a7975d17917c973", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T14:47:57+00:00", "updated_at": "2021-03-07T14:47:57+00:00", "deleted_at": null }, { "uuid": "737f6121-b02c-8b0d-e5d6-1dd494396bc9", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/ipv4/ip_vti.ko", "sha256": "b7d05e1c3e6a0575aa99059cb0e9754011ae66389fd9f0d6360d0f2e75daf2dd", "sha1": "adb3fe469253295a7c7e64bd287a39831bd1a0e1", "md5": "10690a94da48a0ad01ce8624c68faeb5", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3+deb9u1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 78, "vulnerable": 78, "outdated": null, "malicious": null, "created_at": "2021-03-14T23:48:25+00:00", "updated_at": "2021-03-14T23:48:25+00:00", "deleted_at": null }, { "uuid": "5b6a473e-6da1-03c3-335b-b539d90d69b6", "path": "/lib/modules/4.9.0-11-686-pae/kernel/net/ipv4/ip_vti.ko", "sha256": "48cd2126661c91121b9211cd2cdcef2d99d2783df60000a6a14e5d88f17cd9dd", "sha1": "536b72267851906e9ef42ed0a0f66a268c702fc8", "md5": "5db1434633cb4e3798928ac591e6b46b", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-17T00:24:58+00:00", "updated_at": "2021-03-17T00:24:58+00:00", "deleted_at": null } ], "created_at": "2019-08-22T21:50:36+00:00", "updated_at": "2019-08-22T21:50:36+00:00", "deleted_at": null }