Three vulnerabilities fixed in new Linux kernel
The latest version of the Linux kernel, 184.108.40.206, fixes three vulnerabilities. A null pointer dereference in netfilter can cause the kernel to crash when processing certain connections. This bug can be triggered remotely. In addition, as a result of a bug in the cpuset_tasks_read function, users logged onto the system can read part of the kernel memory. This may allow an attacker to access protected information. Finally the kernel also harbours a bug which affects the way seeds for generating random numbers are generated where the system has no entropy source. This may result in applications which rely on random number generators being less secure.
- Changelog for kernel 220.127.116.11, description on kernel.org