Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows malicious users to gain privileges via unspecified vectors.
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis
Important: kernel-rt security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sco ...
Synopsis
Moderate: kernel security and bug fix update
Type/Severity
Security Advisory: Moderate
Topic
An update for kernel is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks
CVE-2015-9016
Ming Lei reported a race condition in the multiqueue block layer
(blk-mq) On a system with a driver using blk-mq (mtip32xx,
null_blk, or virtio_blk), a local user might be able ...
A flaw was found in the patches used to fix the 'dirtycow' vulnerability (CVE-2016-5195) An attacker, able to run local code, can exploit a race condition in transparent huge pages to modify usually read-only huge pages (CVE-2017-1000405)
Linux kernel Virtualization Module (CONFIG_KVM) for the Intel processor family (CONFIG_KVM_INTEL) is vulnerab ...
cvesearch
Just gimme the list & I'll do the work for you None of us are happy about this though
Improved speed by up to 100x
[root@josh9580-cvesearch ~]# time cve-savepy >/dev/null
real 0m0164s
user 0m0129s
sys 0m0035s
[root@josh9580-cvesearch ~]# time cve-checkpy CVE-2017-0861 >/dev/null
real 0m3098s
user 0m2049s
sys 0m0051s
[root@josh958