Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.11.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1855
choose_new_parent in Linux kernel prior to 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process.
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.1
NA
CVE-2005-1913
The Linux kernel 2.6 prior to 2.6.12.1 allows local users to cause a denial of service (kernel panic) via a non group-leader thread executing a different program than was pending in itimer, which causes the signal to be delivered to the old group-leader task, which does not exist...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
NA
CVE-2005-2490
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 prior to 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
NA
CVE-2005-3055
Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.13.1
Debian Debian Linux 3.1
NA
CVE-2005-1368
The key_user_lookup function in security/keys/key.c in Linux kernel 2.6.10 to 2.6.11.8 may allow malicious users to cause a denial of service (oops) via SMP.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.6
NA
CVE-2005-3805
A locking problem in POSIX timer cleanup handling on exit in Linux kernel 2.6.10 to 2.6.14, when running on SMP systems, allows local users to cause a denial of service (deadlock) involving process CPU timers.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.12
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.12
NA
CVE-2005-0180
Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.11.4
NA
CVE-2005-3179
drm.c in Linux kernel 2.6.10 to 2.6.13 creates a debug file in sysfs with world-readable and world-writable permissions, which allows local users to enable DRM debugging and obtain sensitive information.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.12.6
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.12
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.12
NA
CVE-2005-3272
Linux kernel prior to 2.6.12 allows remote malicious users to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.11.4
NA
CVE-2005-2492
The raw_sendmsg function in the Linux kernel 2.6 prior to 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »