Download
| Alert*
oval:org.secpod.oval:def:110622
The kernel meta package oval:org.secpod.oval:def:110623 The kernel meta package oval:org.secpod.oval:def:703253 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:703251 linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel. oval:org.secpod.oval:def:703256 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:703254 linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise Several security issues were fixed in the kernel. oval:org.secpod.oval:def:703249 linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Several security issues were fixed in the kernel. oval:org.secpod.oval:def:703252 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:703250 linux-snapdragon: Linux kernel for Snapdragon Processors Several security issues were fixed in the kernel. oval:org.secpod.oval:def:703255 linux-raspi2: Linux kernel for Raspberry Pi 2 Several security issues were fixed in the kernel. oval:org.secpod.oval:def:52803 linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Several security issues were fixed in the kernel. oval:org.secpod.oval:def:52804 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:1600433 It was found that nfsd is missing permissions check when setting ACL on files, this may allow a local users to gain access to any file by setting a crafted ACL. A flaw was found in the Linux kernel"s keyring handling code, where in key_reject_and_link an uninitialised variable would eventually lead ... oval:org.secpod.oval:def:51624 linux-snapdragon: Linux kernel for Snapdragon Processors Several security issues were fixed in the kernel. oval:org.secpod.oval:def:51626 linux-raspi2: Linux kernel for Raspberry Pi 2 Several security issues were fixed in the kernel. oval:org.secpod.oval:def:51625 linux: Linux kernel Several security issues were fixed in the kernel. oval:org.secpod.oval:def:2100338 The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message. oval:org.secpod.oval:def:1502798 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1502894 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1502895 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:400664 The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system called without verifying that the MNT_LOCKED flag is unset, which allow ... oval:org.secpod.oval:def:89045141 The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. Notable changes in this kernel: - It is now possible to mount a NFS export on the exporting host directly. The following security bugs were fixed: - CVE-2016-5244: A kernel information leak in rds_inc_info_ ... oval:org.secpod.oval:def:602546 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2015-7515, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2187, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3140 Ralf Spenneberg of O ... oval:org.secpod.oval:def:400694 The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.62 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check fo ... |