Tim Steinbach
|
f53850bf21
|
kernel: 4.4.8 -> 4.4.9 (#15276)
|
2016-05-06 20:25:29 +02:00 |
|
Eelco Dolstra
|
454eefa63b
|
linux: 4.4.7 -> 4.4.8
|
2016-04-26 16:39:59 +02:00 |
|
Tim Steinbach
|
ccc3080857
|
kernel: 4.4.6 -> 4.4.7 (#14690)
|
2016-04-14 16:30:20 +02:00 |
|
Eelco Dolstra
|
4b512321de
|
linux: 4.4.5 -> 4.4.6
CVE-2016-2143
|
2016-03-17 13:05:57 +01:00 |
|
Tim Steinbach
|
7c90420119
|
kernel: 4.4.4 -> 4.4.5
|
2016-03-10 01:39:17 +00:00 |
|
Franz Pletz
|
3b1f2e070b
|
linux_4_4: 4.4.3 -> 4.4.4
|
2016-03-05 21:50:03 +01:00 |
|
Franz Pletz
|
73e0c261c2
|
linux: 4.4.2 -> 4.4.3
|
2016-02-27 16:34:02 +01:00 |
|
Franz Pletz
|
5e0105af9b
|
linux: 4.4.1 -> 4.4.2
|
2016-02-22 04:52:00 +01:00 |
|
Eelco Dolstra
|
7b772ae398
|
linux: Update to 3.10.96, 3.12.53, 3.14.60, 3.18.26, 4.1.17, 4.4.1
|
2016-02-02 16:38:42 +01:00 |
|
Nathan Zadoks
|
23f5e3c90f
|
linux: patch CVE-2016-0728 (close #12492)
The PoC provided successfully escalates privileges from a local user to
root. The vulnerability affects any Linux Kernel version 3.8 and higher.
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
|
2016-01-20 09:31:53 +01:00 |
|
Shea Levy
|
44274f62f5
|
linux: Add 4.4
|
2016-01-12 19:39:00 -05:00 |
|