Linux kernel 2.6.21.4 patches three vulnerabilities. A null pointer dereference in netfilter can crash the kernel when handling certain connections; this bug can be triggered remotely. Plus, a flaw in the cpuset_tasks_read function lets logged-in users peek at chunks of kernel memory, potentially exposing sensitive info to attackers. Lastly, there’s a glitch in how seeds for random number generation are handled when the system lacks an entropy source, which could weaken the security of apps relying on random numbers.
~SeeJay


