Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Fedora Local Security Checks
Title:Fedora Update for kernel-headers FEDORA-2019-164946aa7f
Summary:The remote host is missing an update for the 'kernel-headers'; package(s) announced via the FEDORA-2019-164946aa7f advisory.
The remote host is missing an update for the 'kernel-headers'
package(s) announced via the FEDORA-2019-164946aa7f advisory.

Vulnerability Insight:
Kernel-headers includes the C header files that specify the interface
between the Linux kernel and userspace libraries and programs. The
header files define structures and constants that are needed for
building most standard programs and are also needed for rebuilding the
glibc package.

Affected Software/OS:
'kernel-headers' package(s) on Fedora 29.

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-7222
BugTraq ID: 106963
RedHat Security Advisories: RHSA-2019:2029
RedHat Security Advisories: RHSA-2019:2043
RedHat Security Advisories: RHSA-2019:3309
RedHat Security Advisories: RHSA-2019:3517
SuSE Security Announcement: SUSE-SA-2019:0203-1 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2019-6974
BugTraq ID: 107127
RedHat Security Advisories: RHBA-2019:0959
RedHat Security Advisories: RHSA-2019:0818
RedHat Security Advisories: RHSA-2019:0833
RedHat Security Advisories: RHSA-2019:2809
RedHat Security Advisories: RHSA-2019:3967
RedHat Security Advisories: RHSA-2020:0103
Common Vulnerability Exposure (CVE) ID: CVE-2019-7221
[oss-security] 20190218 Linux kernel: three KVM bugs (CVE-2019-6974, CVE-2019-7221, CVE-2019-7222)
RedHat Security Advisories: RHSA-2019:4058
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.