Result for CE351FB645DC8D0659214B5659371202EC2F948A

Query result

Key Value
MD51382EE09988022FB2757DF8F82E37C5B
PackageArchi586
PackageDescriptionQEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system (for example a PC), including a processor and various peripherials. It can be used to launch different Operating Systems without rebooting the PC or to debug system code. * User mode emulation. In this mode, QEMU can launch Linux processes compiled for one CPU on another CPU. As QEMU requires no host kernel patches to run, it is safe and easy to use.
PackageMaintainerghibo <ghibo>
PackageNameqemu
PackageRelease4.2.mga8
PackageVersion5.2.0
SHA-1CE351FB645DC8D0659214B5659371202EC2F948A
SHA-2564483F674BE0AEDFCDDAC7BA093CE34E6EEE1644F18A28623DB88B15800DA52D3
hashlookup:children-total60
hashlookup:trust50

Network graph view

Children (Total: 60)

The searched file hash includes 60 children files known and seen by metalookup. A sample is included below:

Key Value
FileNameusbredir-fix-free-call-CVE-2021-3682.patch
FileSize1421
MD56E01F0D133BC400D734A3D74134F8638
SHA-108A75C0CDAFA660C8E14CAD31ED3D6610DAAA51E
SHA-256F84822CD12BBA5D0BF48E231B01141540E213B22AB8C74F9B37A082656718D52
SSDEEP24:26CcP2JXm0RUjmS+CzlyEYTfYrPQiQ0kHK3464g+JAemk4F:26CcP2k0uXMrAP4IL4BeemkE
TLSHT16B2161043FB57E14546C94DD3348B10DA26BA2FE62AEE4647C8C8281BF49C9188BEF53
Key Value
FileNamefix-memory-leak-while-calling-vg_resource_unref-CVE-2021-3544.patch
FileSize1512
MD52C7A319129F7E73AA50EA2EB55865505
SHA-10BD07EE707B1D2B77AB6F76CFDB5548327BA27D6
SHA-2561A9450EF93C36EFB3637A6C5C9942503F1D2A4476262C5EC65C3912BBC5729E6
SSDEEP24:7x5LXLhDa9sXm0Uoc1B/JiCglyVnCpzENW6zmQb6ShjVIxbrSf1:1tb8T0URpiC/RCpkWClb6KpINi
TLSHT1533177523D3D96389937B913342BBADC6C86F253F66FDCADF0BD01846BC249044B6954
Key Value
FileNameqemu-5.2.0.tar.xz
FileSize106902800
MD5179F86928835DA857C237B42F4B2DF73
SHA-1146578267387E301423502D19024F8FFE35AB332
SHA-256CB18D889B628FBE637672B0326789D9B0E3B8027E0445B936537C78549DF17BC
SSDEEP3145728:GzaCHSD2gUvYBeV+JiMeFip3rcxId4Fnixmcox3zJybAPcQi+9:GzaMSD2gUQBeQJ8FitrqIeFemcyziWcu
TLSHT15F38335198ED8D34968720BCC80B3105F6A378A7832766B8C2E7E75494B70B4B86FB57
Key Value
FileNamenet-qemu_receive_packet-for-loopback-sungem.patch
FileSize1295
MD5181A1670A85444ED2A80C0D5EE50E8D3
SHA-121208D6823DC4DF3C265B86F4955414CDDC5AA41
SHA-25644FC84D825949E6BA63AAA7D0069BA4817C6ED7C6E73D9AC025F4CBC3EFF7DB9
SSDEEP24:p5vWRB9XmLc/2fQhOmEO/CUdfYrPzIaQvNfvugs+TrLFeWraTaONah:p5uALc+fQhuO/CUCPzOvNHPoWWuOoh
TLSHT127219B4741C4542985B6F11F4F6ED8195B5C7EEC62FCA4D6351DD4C05F45C4049EED14
Key Value
FileNamenet-qemu_receive_packet-for-loopback-rtl8139.patch
FileSize1290
MD5A147098A365C6DCFA67AC28C8E648D41
SHA-1229A265646E74C6B10514B815FAB5F757DD3BAE4
SHA-25677858FB90C55224593B90A9FB5CCD40363CAB87F17A96340462369D9E5E3B7DF
SSDEEP24:OW2A9XmNYv/2fQhOq6blKfYrPSVpbQHlgchYFsjsNvpMRMaa:OW2XNe+fQhVglnPSD8HlgRe4RUa
TLSHT16F21958B0646A839804AD18E8315E41CFC8C6AFE73EC6C85325D5456FF88C904DAFE12
Key Value
FileNameopenbios-address-of-packet-member.patch
FileSize379
MD550DADC3947F910079D03037DB33DDB44
SHA-12ACA12F8C6D3FCAD63052332D52771EB9F92EAF0
SHA-256D89868421EE39F890C260388112FFCE9EF6AE1E431A28DEF48B851A5B018A728
SSDEEP6:oH0G9VGSXMpQmxGOG90jGNAy5/52v+k3DORX1BShqnLcSWnLn:oUG9VGpQwGOG9YGNAy5/Av+k3DMzcqnE
TLSHT159E09B107EC58D729CB14980A7839C273149A452C77BE1D4A5C23A85569C09EF57F61C
Key Value
FileName0001-build-no-pie-is-no-functional-linker-flag.patch
FileSize3000
MD5BD986049BACAEE0D27117C16793F77CC
SHA-12E29B14F1053B241B613BDC332BCEAE581029D92
SHA-256CF816F75A004E65C41DEEB17D68A06B3D59A3903C04499AE81B8F72821885B5D
SSDEEP48:ntyz2C5HpbVBDoINHq/XRzSTVWom+hyPr+mR+0IXK5M4bSO4Q4J5w7:MzlvDsom+hyPr/R+eS7C
TLSHT1105145433318B8730EAB0594280E5EC3FA748B7A8B5E098FF06863DD6B99C44C16A45A
Key Value
FileNamelinux-user-elfload-fix-address-calculation-in-fallback-scenario.patch
FileSize2157
MD556680DB6AE085B74E428A73A224D23F8
SHA-132637EFEBFDA65E947D00FDAA9D5AA1A5CD94360
SHA-2561FBDB0B01E4DDF6DE1793AB8A79F89B37F7D824783CB87D661052C08F13CC3DB
SSDEEP48:GqoKSDsYpOFugN0KnShbHGS+t3bNnbUdkX6DeJ2wICuA:cIDhRxvnbUy2w5uA
TLSHT19841755E16C05C0A2BF342832613741DE72E30EB25CB3611FAED87589F169B09B39AC0
Key Value
FileNameseabios-hppa-use-consistent-date-and-remove-hostname.patch
FileSize1223
MD537378189C70C986698CECBE747C781DF
SHA-135A04CF543ADC5066C52C9406B22A4B83005F9E2
SHA-2560CBEF821AF4D717A9CF33E8FAC0A6888C913B3B8ABDF67AB84D9EF704ADEEFB3
SSDEEP24:hl6+Nuu37YMzdDgPDuFQS9SHYPSQ30EY8SDvdHaT:aGnZDgruFQNaSQVJSD5aT
TLSHT1F921A330CF32C77232008BC40A44B2DBFBB8A39B12D25460F85F92235B8252861F78DC
Key Value
FileNamevirtiofsd-drop-remapped-security.capability-xattr-as-needed-CVE-2021-20263.patch
FileSize6605
MD5DE8E6A921C09F4F8479423C2CB6A90B7
SHA-1361CB6F7B881578105B17A3BD8AE5863AE343806
SHA-256F3B7D11E95C7C2DD0F3ED7ACC613D89615126C23B1E84BD47C1F7415DB71EA36
SSDEEP96:p5ORKn8jsQ74KNkvX9g8YA+LRJHtR0Nn9tbEdBh4wKMxSqgcMj:p5OYCl74KNkP9gJNyNnbEdB2wKMx/grj
TLSHT108D1A7523DB482324AA25BDF8639608DC314B83B23F65968780F66686F4409893B57DE