Linux kernel vulnerabilities in Ubuntu 10.04 - multiple denial of service and privilege escalation flaw
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Linux kernel (Marvell DOVE) vulnerabilities | 25 Oct 201100:00 | – | ubuntu |
![]() | Linux kernel (EC2) vulnerabilities | 25 Oct 201100:00 | – | ubuntu |
![]() | Linux kernel (Marvell DOVE) vulnerabilities | 25 Oct 201100:00 | – | ubuntu |
![]() | Linux kernel (OMAP4) vulnerabilities | 29 Sep 201100:00 | – | ubuntu |
![]() | Linux kernel (Maverick backport) vulnerabilities | 29 Sep 201100:00 | – | ubuntu |
![]() | Linux kernel vulnerabilities | 25 Oct 201100:00 | – | ubuntu |
![]() | Linux kernel vulnerabilities | 11 Oct 201100:00 | – | ubuntu |
![]() | Linux kernel (OMAP4) vulnerabilities | 12 Oct 201100:00 | – | ubuntu |
![]() | Linux kernel (i.MX51) vulnerabilities | 25 Oct 201100:00 | – | ubuntu |
![]() | Linux kernel vulnerabilities | 4 Oct 201100:00 | – | ubuntu |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Ubuntu | 10.04 | noarch | linux-image-2.6.32-35-generic | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | block-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | char-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | crypto-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | fat-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | fb-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | firewire-core-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | floppy-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | fs-core-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Ubuntu | 10.04 | noarch | fs-secondary-modules-2.6.32-35-generic-di | 2.6.32-35.78 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo