Zercurity data services
  • Summary
  • Applications (0)
  • Packages (2)
  • Vulnerabilities (0)

7535dc0e68e0a058be18bc833912dd449a5f82.debug

Hashes
  • SHA256: f9934f49c50a9948788a694c0e884036165f8d5b04296bcbea689495e481a34a
  • SHA1: 307f973c61a3074c25e81b5ebe3d0bbe61eb6b49
  • MD5: fbd4286fbcf3f61a5abcaeb084aea698
Information
  • Package: linux-modules-4.15.0-1057-oem
  • Size: 78096
  • Platform: LINUX

Packages

NameTypeArchSizeRisk
linux-modules-4.15.0-1057-oem
linux-modules-4.15.0-1057-oem_4.15.0-1057.66_amd64.deb
DEBAMD64229139100
linux-modules-4.15.0-1057-oem
linux-modules-4.15.0-1057-oem_4.15.0-1057.66_amd64.deb
DEBAMD64229139100

Raw Object

{
  "sha256": "f9934f49c50a9948788a694c0e884036165f8d5b04296bcbea689495e481a34a",
  "sha1": "307f973c61a3074c25e81b5ebe3d0bbe61eb6b49",
  "md5": "fbd4286fbcf3f61a5abcaeb084aea698",
  "name": "7535dc0e68e0a058be18bc833912dd449a5f82.debug",
  "size": 78096,
  "description": null,
  "package": "linux-modules-4.15.0-1057-oem",
  "platform": "LINUX",
  "risk": 0,
  "vulnerable": null,
  "outdated": null,
  "malicious": null,
  "packages": [
    {
      "uuid": "f462d44e-7797-201a-db7f-cd5c480b6207",
      "path": "/lib/modules/4.15.0-1057-oem/vdso/vdso32.so",
      "sha256": "711f61680a4901fe410ec84b8fe59c706db14e793fc7cfd2eb46dfa70579bc0a",
      "sha1": "9acf7cdbd493e9dbff22d75fedc469d0b3242cff",
      "md5": "d0ed038f187929a2301608b608a42242",
      "type": "DEB",
      "arch": "AMD64",
      "name": "linux-modules-4.15.0-1057-oem",
      "filename": "linux-modules-4.15.0-1057-oem_4.15.0-1057.66_amd64.deb",
      "size": 229139,
      "description": "Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP\nContains the corresponding System.map file, the modules built by the packager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports OEM processors.\n\nGeared toward desktop systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
      "url": null,
      "version": "4.15.0-1057.66",
      "source": "linux-oem",
      "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
      "dependencies": null,
      "risk": 100,
      "vulnerable": 100,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T03:46:57+00:00",
      "updated_at": "2021-03-20T03:46:57+00:00",
      "deleted_at": null
    },
    {
      "uuid": "f462d44e-7797-201a-db7f-cd5c480b6207",
      "path": "/lib/modules/4.15.0-1057-oem/vdso/.build-id/72/7535dc0e68e0a058be18bc833912dd449a5f82.debug",
      "sha256": "711f61680a4901fe410ec84b8fe59c706db14e793fc7cfd2eb46dfa70579bc0a",
      "sha1": "9acf7cdbd493e9dbff22d75fedc469d0b3242cff",
      "md5": "d0ed038f187929a2301608b608a42242",
      "type": "DEB",
      "arch": "AMD64",
      "name": "linux-modules-4.15.0-1057-oem",
      "filename": "linux-modules-4.15.0-1057-oem_4.15.0-1057.66_amd64.deb",
      "size": 229139,
      "description": "Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP\nContains the corresponding System.map file, the modules built by the packager, and scripts that try to ensure that the system is not left in an\nunbootable state after an update.\n\nSupports OEM processors.\n\nGeared toward desktop systems.\n\nYou likely do not want to install this package directly. Instead, install\nthe linux-oem meta-package, which will ensure that upgrades work\ncorrectly, and that supporting packages are also installed.",
      "url": null,
      "version": "4.15.0-1057.66",
      "source": "linux-oem",
      "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
      "dependencies": null,
      "risk": 100,
      "vulnerable": 100,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-20T03:46:57+00:00",
      "updated_at": "2021-03-20T03:46:57+00:00",
      "deleted_at": null
    }
  ],
  "created_at": "2019-09-18T14:16:30+00:00",
  "updated_at": "2019-09-18T14:16:30+00:00",
  "deleted_at": null
}