Download
| Alert*
oval:org.secpod.oval:def:702593
linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:1501937 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:702641 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:52522 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:702645 linux-lts-trusty: Linux hardware enablement kernel from Trusty Several security issues were fixed in the kernel. oval:org.secpod.oval:def:702643 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:52518 linux-lts-utopic: Linux hardware enablement kernel from Utopic Several security issues were fixed in the kernel. oval:org.secpod.oval:def:702638 linux-lts-utopic: Linux hardware enablement kernel from Utopic Several security issues were fixed in the kernel. oval:org.secpod.oval:def:602150 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service, information leaks or data corruption. CVE-2015-1805 Red Hat discovered that the pipe iovec read and write implementations may iterate over the iovec twice but will modify the ... oval:org.secpod.oval:def:702602 linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel. oval:org.secpod.oval:def:602172 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation or denial of service. CVE-2015-3290 Andy Lutomirski discovered that the Linux kernel does not properly handle nested NMIs. A local, unprivileged user could use this flaw for privilege escalation. ... oval:org.secpod.oval:def:89045442 The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. Following security bugs were fixed: * CVE-2015-6252: Possible file descriptor leak for each VHOST_SET_LOG_FDcommand issued, this could eventually wasting available system resources and creating a denial of ... |