Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.0 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2006-1343
net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local use...
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.4.0
4.6
CVSSv2
CVE-2001-0316
Linux kernel 2.4 and 2.2 allows local users to read kernel memory and possibly gain privileges via a negative argument to the sysctl call.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.0
1 EDB exploit
3.7
CVSSv2
CVE-2001-0317
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.4.0
2 EDB exploits
5
CVSSv2
CVE-2003-0465
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
Linux Linux Kernel 2.5.0
Linux Linux Kernel 2.4.0
4.6
CVSSv2
CVE-2004-0109
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.5.0
7.5
CVSSv2
CVE-2001-0405
ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote malicious users to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall.
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.3
1 EDB exploit
2.1
CVSSv2
CVE-2007-3720
The process scheduler in the Linux kernel 2.4 performs scheduling based on CPU billing gathered from periodic process sampling ticks, which allows local users to cause a denial of service (CPU consumption) by performing voluntary nanosecond sleeps that result in the process not b...
Linux Linux Kernel 2.4.0
7.2
CVSSv2
CVE-2004-1144
Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges.
Linux Linux Kernel 2.4.0
5
CVSSv2
CVE-2004-0177
The ext3 code in Linux 2.4.x prior to 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by re...
Linux Linux Kernel 2.4.0
2.1
CVSSv2
CVE-2004-0178
The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x prior to 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.
Linux Linux Kernel 2.4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »