[FEDORA-2010-13903] Fedora 12: kernel
Severity
High
Affected Packages
1
CVEs
11
Update to kernel 2.6.32.21: *
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.20 *
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21
Package | Affected Version |
---|---|
pkg:rpm/fedora/kernel?distro=fedora-12 | < 2.6.32.21.166.fc12 |
- ID
- FEDORA-2010-13903
- Severity
- high
- Severity from
- CVE-2010-2524
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2010-13903
- Published
-
2010-09-02T20:42:04
(14 years ago) - Modified
-
2010-09-02T20:42:04
(14 years ago) - Rights
- Copyright 2010 Red Hat, Inc.
- Other Advisories
-
- ELSA-2010-0019
- ELSA-2010-0504
- ELSA-2010-0610
- FEDORA-2009-13039
- FEDORA-2009-13700
- FEDORA-2010-0823
- FEDORA-2010-10876
- FEDORA-2010-10880
- FEDORA-2010-11412
- FEDORA-2010-11462
- FEDORA-2010-13058
- FEDORA-2010-13110
- FEDORA-2010-14235
- FEDORA-2010-14878
- FEDORA-2010-14890
- FEDORA-2010-1500
- FEDORA-2010-1787
- FEDORA-2010-1804
- FEDORA-2010-18432
- FEDORA-2010-18506
- FEDORA-2010-18983
- FEDORA-2010-7779
- FEDORA-2010-9183
- FEDORA-2010-9209
- FEDORA-2011-2134
- FEDORA-2011-6447
- NGINX:CVE-2010-2266
- SUSE-SU-2015:0652-1
- USN-1000-1
- USN-1074-1
- USN-1074-2
- USN-1083-1
- USN-1093-1
- USN-869-1
- USN-914-1
- USN-947-1
- USN-966-1
- USN-974-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 625699 | Bug #625699 - CVE-2010-2959 kernel: can: add limit for nframes and clean up signed/unsigned variables | https://bugzilla.redhat.com/show_bug.cgi?id=625699 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/kernel?distro=fedora-12 | fedora | kernel | < 2.6.32.21.166.fc12 | fedora-12 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |