Key | Value |
---|---|
FileName | policy-limited.xml |
FileSize | 5517 |
MD5 | 03FB84FEF5DD639CD230A386E514D4AE |
RDS:package_id | 326826 |
SHA-1 | 475287411F70FE2F27375DCCDB88EB567342DACD |
SHA-256 | 6629CB0F005F2137BE75193725DCF3A64B5C9842BCCF14332FB0CFC451F376F9 |
SSDEEP | 48:c8hwktmyJyWX1wH9r2b/8qsXbtr0JyHbHmK7SkCVLsNIbdN8l5NZd+rVssYgcBO0:jJyWlSU/8pD9CHbXeKp4gUv93feg |
TLSH | T1F3B15115EB0DE832C09253A77498E395DAB6E4FC375801B830EDD66073E7B9441BB5E4 |
insert-timestamp | 1751463625.8736756 |
source | modern.db |
hashlookup:parent-total | 2 |
hashlookup:trust | 60 |
The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | EC07F8FE761921E1311DA29C00A679A3 |
PackageArch | s390x |
PackageDescription | The primary objective of the limited security policy is to find a middle ground between convenience and security. This policy involves the deactivation of potentially hazardous functionalities, like specific coders such as SVG or HTTP. Furthermore, it establishes several constraints on the utilization of resources like memory, storage, and processing duration, all of which are adjustable. This policy proves advantageous in situations where there's a need to mitigate the potential threat of handling possibly malicious or demanding images, all while retaining essential capabilities for prevalent image formats. |
PackageMaintainer | https://www.suse.com/ |
PackageName | ImageMagick-config-7-upstream-limited |
PackageRelease | 150600.1.11 |
PackageVersion | 7.1.1.21 |
SHA-1 | E5A0C0C02D3E72753262DB80A2FB34C0B167C428 |
SHA-256 | 42B3E768C2C467C5C469953F6EA9D0FDAB7145F2B864C549376BBE599E7346BB |
Key | Value |
---|---|
MD5 | 21B4C3D7960261E3E01149FDD1E7AB39 |
PackageArch | x86_64 |
PackageDescription | The primary objective of the limited security policy is to find a middle ground between convenience and security. This policy involves the deactivation of potentially hazardous functionalities, like specific coders such as SVG or HTTP. Furthermore, it establishes several constraints on the utilization of resources like memory, storage, and processing duration, all of which are adjustable. This policy proves advantageous in situations where there's a need to mitigate the potential threat of handling possibly malicious or demanding images, all while retaining essential capabilities for prevalent image formats. |
PackageMaintainer | https://www.suse.com/ |
PackageName | ImageMagick-config-7-upstream-limited |
PackageRelease | 150600.1.11 |
PackageVersion | 7.1.1.21 |
SHA-1 | 306C4F40905919741ECCB4D06E5AC1814B381FF6 |
SHA-256 | A430C4500C2C88E5293F947F52B740FC22E980CC33EDF02F4E3FF0C197E49F51 |