Children (Total: 10)
The searched file hash includes 10 children files known and seen by metalookup. A sample is included below:
Key |
Value |
FileName | CVE-2016-9804-tool-hcidump-Fix-memory-leak-with-malformed-packet.patch |
FileSize | 772 |
MD5 | E7A7F6B8D1917DF716D234974CEE019C |
SHA-1 | 3479CEA42CCDCBE1F3098162D726A291C31BC594 |
SHA-256 | 4E02AD5E0EBBFC18330C06A008F808C81077DA26188210D8AB42827E28C99394 |
SSDEEP | 12:RGM7xffmcJ56ysEanWH9CUmUtAIo6yOAm7QbQfbDSFH6uDSX7zDp1+O:RBlfxJY18TnndBA2QbQfbDmauDcDp13 |
TLSH | T1C1012061C2B906D421799247AB2C6212E29B6B6A2791F62584CD1B803D08E89D6DFB14 |
Key |
Value |
FileName | 0004-agent-Assert-possible-infinite-loop.patch |
FileSize | 583 |
MD5 | 7ECA6C13DC122A6AE65DC9DBB38FC1C1 |
SHA-1 | 135DF076F92F684D92A4FF16EAC5718955FB263A |
SHA-256 | 7164B3C2E759336F926210B923B917EE5B3098024FD7A46D39CFE0C0E463DDB3 |
SSDEEP | 12:lXxfuGq4PFMxmKf6UgIojbAPpDO2NbQTLWDITr4B5ZMiY595lil8VpfB:LfuG7k/66+bAPhO6bQTGI0ZJE9/il8VD |
TLSH | T1F0F0EB4B10CC3A3307838BB07502736232397970C39EA0C0BDAA43A8E9493A1D6A752D |
Key |
Value |
FileName | 1cd644db8c23a2f530ddb93cebed7dacc5f5721a.patch |
FileSize | 5018 |
MD5 | 03C59C89F5752A8DE72AB7527212615D |
SHA-1 | 778AEA5F4B3974DA079847900D1EA280EDCBF7E5 |
SHA-256 | 16D827517A180FB1CD6A2F1FD90EE74AB7175962ECDFF7A7421858161EF41120 |
SSDEEP | 96:YSzFDPRHJBA4I3x1MRSR0+sgvnDwMfwB/qCvQBruhl04huh8hG2Nfhv:YSzpPR4/MgnsW7fw/cchl04huh8hG2NZ |
TLSH | T1D9A1559CA86CE4E15FF36514A47297E2736DE4C0B3BE203434BAC1B4DDAE2769164C87 |
Key |
Value |
FileName | bluez.spec |
FileSize | 28993 |
MD5 | 0566E4D74773FA2FF9FCCDCEA22A6274 |
SHA-1 | C5304FAEC5F2164A85C8914FE3A9601EBB134793 |
SHA-256 | 8103C4545CD2D71FCD3ECE1CEACEADD51CC9BB765F85D815284B3412429B68C4 |
SSDEEP | 384:3qB8NInUHOzLhILc6cNvTCRE1ySsZcOQtKuo3SPcc7PJYZoK2/43JJgDvnO1RGva:hNInUuz1IIBNl1pbK4MKzO1+zfNftO |
TLSH | T11FD2B83AAF84446235AEF1EBC4D5164CEF3FB07AF07F44C8706A91C01396A50666DDB6 |
Key |
Value |
FileName | 0001-work-around-Logitech-diNovo-Edge-keyboard-firmware-i.patch |
FileSize | 1158 |
MD5 | 2B1F0D7EC5C180C95FAA494E5C5D4E50 |
SHA-1 | C8CAF445AB94CFCCF933FDFC1EEE7990D49FA114 |
SHA-256 | ABD597A20F529F7AF8E66FEAC5BE292BA09DCCE661FBF80ABBB654B7B6AB3639 |
SSDEEP | 24:L8fGzso3Qa5DVMIZFK3Q/OqrQI6pT6NwdJNwdnCBmaeC57:L2GAbCSI7Kg/Frh42NyJNynCdeCN |
TLSH | T167211472D35E3581104FB31BFB289703EC995397C9A719949EEC8880C7AD464F7C1430 |
Key |
Value |
FileName | CVE-2021-3588.patch |
FileSize | 744 |
MD5 | 5C6160189F810D702A779EDEF6183991 |
SHA-1 | 7DCFCBB3D1AD774F973C0B2471D0562EB3D56FE5 |
SHA-256 | 9907793E10CBB8DB6C2BD0C9049EB6E275DB1CA8A296D3696B6346DCAAEAA66E |
SSDEEP | 12:zWUxfehvcBY8G8atuHpqUwfAV2t8WJqtAIo6yOdBtJLCDer/GBoYQFixP4LWBv:zrfeq9G8at8PjTWGndBKDHBOQv |
TLSH | T1AB01104F3A4D9DBE4C3ED162901A231437F87159AFE9D04A808DEF588EB08B2144F076 |
Key |
Value |
FileName | CVE-2020-26558.patch |
FileSize | 3047 |
MD5 | 2EFF74C10A78CD3A7B75E83E43A316B3 |
SHA-1 | 90CB3DC35BB6E7BE5262C3082E3CCDF01EA9B4B3 |
SHA-256 | D63EC133EDFC73F16A332B15CA41F570C959778F709C72087859BD4475946455 |
SSDEEP | 48:yMg4vzxEsQdxFNZZyi16P2dt6DC+PrDQK2o5R2gv/62/R2NI0hFq962o5R2gdoKB:E+tEbsbDC+PQK93vyoIPhFq9693doK6C |
TLSH | T1D75158336F0C4A1B11FAA0D774214C0AD1BA75DDF7AE205CBAD12BA79D2443642BB25F |
Key |
Value |
FileName | bluez-5.54.tar.xz |
FileSize | 2003760 |
MD5 | E637FEB2DBB7582BBBFF1708367A847C |
SHA-1 | 02E247790EAB70329F2D94794E46181BB28E975F |
SHA-256 | 68CDAB9E63E8832B130D5979DC8C96FDB087B31278F342874D992AF3E56656DC |
SSDEEP | 24576:LyNtedtKu/O9dMUmG4QYx2K3HAwy228A9+fRst7brd6qCK6l95A1cH3KjyET/6gK:OOouGtmzhxHAwp2T9+sgdt3KG66g7e |
TLSH | T1139533E303E4770D0A5279B2A2F17B6D459737F82E91AAB0BFDAD7C5977C6878481002 |
Key |
Value |
FileName | 0001-Allow-using-obexd-without-systemd-in-the-user-sessio.patch |
FileSize | 931 |
MD5 | 95823CCD8A826429C8652B5FD868EF7F |
SHA-1 | 52A31E1268FB69D1B9095C2AA5BF469DEBA58949 |
SHA-256 | 1FE19B8718F40FF7BDF253096818E07222B07C034EBEEABA6EDB12EE1B104689 |
SSDEEP | 24:gMiwnT7icveXiXK4dtHXKTdtHXKuBKGXKmGXKtKGXK7IrGXKgmDt:DnTecTXpdtHXIdtHXNKGXzGXWKGXvrGS |
TLSH | T1FD113DA7EFD645B59D4333231CE268CD316DF566BED7E12016BC408255D9C1902F8642 |
Key |
Value |
FileName | 0001-obex-Use-GLib-helper-function-to-manipulate-paths.patch |
FileSize | 1252 |
MD5 | A8B400B0C002AD3374C196360ADA60BB |
SHA-1 | DD1336274A6658D6F9C8CBE5B40C5A7F072B0CE4 |
SHA-256 | 86E3D24527F44C5A225E6D92457BE52026481A7AC0D7944700EF4445D8AFC8B4 |
SSDEEP | 24:XufuGxeWw/vY6drMFKGPRGpfQJKGOrGv6EHmk1T02nLfGRuvQO26F8NIf:oRYdvY0wFKGPRGKJKGOrGjHmk1xnLfmM |
TLSH | T1B3210FA681DD21E50783BF11BC195456092DC2F6F7E3C011BDBC9AA0E0C58F283E8527 |