Linux kernel (Oneiric backport) vulnerabilities in Ubuntu 10.0
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Linux kernel (OMAP4) vulnerabilities | 30 Nov 201200:00 | – | ubuntu |
![]() | Linux kernel vulnerabilities | 30 Nov 201200:00 | – | ubuntu |
![]() | Linux kernel (OMAP4) vulnerabilities | 30 Nov 201200:00 | – | ubuntu |
![]() | Linux kernel vulnerabilities | 30 Nov 201200:00 | – | ubuntu |
![]() | Linux kernel vulnerabilities | 30 Nov 201200:00 | – | ubuntu |
![]() | Linux kernel (OMAP4) vulnerabilities | 30 Nov 201200:00 | – | ubuntu |
![]() | Linux kernel vulnerability | 12 Oct 201200:00 | – | ubuntu |
![]() | Linux kernel (OMAP4) vulnerability | 9 Oct 201200:00 | – | ubuntu |
![]() | Linux kernel vulnerabilities | 8 Apr 201300:00 | – | ubuntu |
![]() | Linux kernel (EC2) vulnerabilities | 9 Apr 201300:00 | – | ubuntu |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Ubuntu | 10.04 | noarch | linux-image-3.0.0-28-generic-pae | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | block-modules-3.0.0-28-generic-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | block-modules-3.0.0-28-virtual-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | crypto-modules-3.0.0-28-generic-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | crypto-modules-3.0.0-28-virtual-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | fat-modules-3.0.0-28-generic-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | fat-modules-3.0.0-28-virtual-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | fb-modules-3.0.0-28-generic-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | fb-modules-3.0.0-28-virtual-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Ubuntu | 10.04 | noarch | floppy-modules-3.0.0-28-generic-di | 3.0.0-28.45~lucid1 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo