Debian Bug report logs -
#796036
linux-image-3160-4-amd64: concurrent msync triggers NULL pointer dereference
Package:
src:linux;
Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>;
Reported by: Xavier Chantry <xavierchantry@interseccom>
Date: Tue, 18 Aug 2015 18:09:01 UTC
Severity: i ...
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Topic
Updated kernel packages that fix multiple security issues, address severalhundred bugs, and add numerous enhancements are now available as part ofthe ongoing support and maintenance of Red H ...
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Topic
Updated kernel packages that fix three security issues, several bugs, andone enhancement are now available for Red Hat Enterprise Linux 71 ExtendedUpdate SupportRed Hat Product Security ha ...
Synopsis
Important: kernel-rt security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Topic
Updated kernel-rt packages that fix multiple security issues, several bugs,and add various enhancements are now available for Red Hat EnterpriseLinux 7Red Hat Product Security has rated ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Important securityimpact ...
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, unauthorised
information disclosure or unauthorised information modification
CVE-2015-2925
Jann Horn discovered that when a subdirectory of a filesystem was
bind-mounted into a chroot or mount namespace, a user that ...
A race condition in the IPC object implementation in the Linux kernel through 423 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msgc, shmc, and utilc (CVE-2015-7613)
Linux kernels built with the name spaces support(CONFIG_NAMESPACE) is vulnera ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...