fcb51fd1a879c5ce5c580e646279499a83f0b4941afcade2d1a4cbb5ee7216ba
8615cc11c677698525fec8a0c24363c4f1ac6fca
5e684fba8167696cbb4d01e8affc763b
linux-image-4.9.0-11-686-pae
8436
LINUX
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb | DEB | I386 | 138442 | 88 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb | DEB | I386 | 138442 | 0 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb | DEB | I386 | 138443 | 78 |
linux-image-4.9.0-11-686-pae linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb | DEB | I386 | 138443 | 0 |
{ "sha256": "fcb51fd1a879c5ce5c580e646279499a83f0b4941afcade2d1a4cbb5ee7216ba", "sha1": "8615cc11c677698525fec8a0c24363c4f1ac6fca", "md5": "5e684fba8167696cbb4d01e8affc763b", "name": "msr.ko", "size": 8436, "description": null, "package": "linux-image-4.9.0-11-686-pae", "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "packages": [ { "uuid": "c38d8345-5563-f05b-75bf-8e7d2a99d730", "path": "/lib/modules/4.9.0-11-686-pae/kernel/arch/x86/kernel/msr.ko", "sha256": "23af7864f624a6aa3863acbd918bb6d85836c9dffa2e92cdfd76c1a33f96ae03", "sha1": "043972b47de07defc7a1f721b71e70a193ba7327", "md5": "967619750c9cc59d91ebdf2ed55d4418", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 88, "vulnerable": 88, "outdated": null, "malicious": null, "created_at": "2021-03-06T09:20:02+00:00", "updated_at": "2021-03-06T09:20:02+00:00", "deleted_at": null }, { "uuid": "58a6e7ea-1d76-7ff0-d422-d716bd4f2e0c", "path": "/lib/modules/4.9.0-11-686-pae/kernel/arch/x86/kernel/msr.ko", "sha256": "930e3bd730e4b0f0e4b0f4fe6a4f5ed91f8045cf700e73ccc0f6180396ad6dcf", "sha1": "8d5cb37b4f4cc422c86c788a0fc83dbf45a6fa62", "md5": "d6e39819128604a92a7975d17917c973", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-2_i386.deb", "size": 138442, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T14:47:00+00:00", "updated_at": "2021-03-07T14:47:00+00:00", "deleted_at": null }, { "uuid": "737f6121-b02c-8b0d-e5d6-1dd494396bc9", "path": "/lib/modules/4.9.0-11-686-pae/kernel/arch/x86/kernel/msr.ko", "sha256": "b7d05e1c3e6a0575aa99059cb0e9754011ae66389fd9f0d6360d0f2e75daf2dd", "sha1": "adb3fe469253295a7c7e64bd287a39831bd1a0e1", "md5": "10690a94da48a0ad01ce8624c68faeb5", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-3+deb9u1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-3+deb9u1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 78, "vulnerable": 78, "outdated": null, "malicious": null, "created_at": "2021-03-14T23:47:35+00:00", "updated_at": "2021-03-14T23:47:35+00:00", "deleted_at": null }, { "uuid": "5b6a473e-6da1-03c3-335b-b539d90d69b6", "path": "/lib/modules/4.9.0-11-686-pae/kernel/arch/x86/kernel/msr.ko", "sha256": "48cd2126661c91121b9211cd2cdcef2d99d2783df60000a6a14e5d88f17cd9dd", "sha1": "536b72267851906e9ef42ed0a0f66a268c702fc8", "md5": "5db1434633cb4e3798928ac591e6b46b", "type": "DEB", "arch": "I386", "name": "linux-image-4.9.0-11-686-pae", "filename": "linux-image-4.9.0-11-686-pae_4.9.189-1_i386.deb", "size": 138443, "description": "Linux 4.9 for modern PCs\nThe Linux kernel 4.9 and modules for use on PCs with one or more\nprocessors supporting PAE.\n\nThis kernel requires PAE (Physical Address Extension). This feature is\nsupported by the Intel Pentium Pro/II/III/4/4M/D, Xeon, Core and Atom; AMD\nGeode NX, Athlon (K7), Duron, Opteron, Sempron, Turion or Phenom;\nTransmeta Efficeon; VIA C7; and some other processors.\n\nThis kernel also runs on a Xen hypervisor. It supports both privileged\n(dom0) and unprivileged (domU) operation.", "url": "https://www.kernel.org/", "version": "4.9.189-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-17T00:24:08+00:00", "updated_at": "2021-03-17T00:24:08+00:00", "deleted_at": null } ], "created_at": "2019-08-22T21:50:36+00:00", "updated_at": "2019-08-22T21:50:36+00:00", "deleted_at": null }