Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.21 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-3731
The Linux kernel 2.6.20 and 2.6.21 does not properly handle an invalid LDT segment selector in %cs (the xcs field) during ptrace single-step operations, which allows local users to cause a denial of service (NULL dereference and OOPS) via certain code that makes ptrace PTRACE_SET...
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.20
NA
CVE-2007-6712
Integer overflow in the hrtimer_forward function (hrtimer.c) in Linux kernel 2.6.21-rc4, when running on 64-bit systems, allows local users to cause a denial of service (infinite loop) via a timer with a large expiry value, which causes the timer to always be expired.
Kernel Linux Kernel 2.6.21 Rc4
NA
CVE-2007-6417
The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 up to and including 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of service (crash).
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.22
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.19
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.23
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.12
NA
CVE-2007-2172
A typo in Linux kernel 2.6 prior to 2.6.21-rc6 and 2.4 prior to 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
Linux Linux Kernel 2.6.21
Linux Linux Kernel
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
NA
CVE-2008-0352
The Linux kernel 2.6.20 up to and including 2.6.21.1 allows remote malicious users to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.20.13
Linux Linux Kernel 2.6.20.5
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.21.1
Linux Linux Kernel 2.6.20.12
Linux Linux Kernel 2.6.20.8
Linux Linux Kernel 2.6.20.15
Linux Linux Kernel 2.6.20.11
Linux Linux Kernel 2.6.20.3
Linux Linux Kernel 2.6.20.10
Linux Linux Kernel 2.6.20.2
Linux Linux Kernel 2.6.20.1
Linux Linux Kernel 2.6.20.4
Linux Linux Kernel 2.6.20.14
Linux Linux Kernel 2.6.20.7
1 EDB exploit
NA
CVE-2007-5501
The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 up to and including 2.6.23.7, and 2.6.24-rc up to and including 2.6.24-rc2, allows remote malicious users to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer...
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.22
Linux Linux Kernel 2.6.22.4
Linux Linux Kernel 2.6.22.21
Linux Linux Kernel 2.6.23.7
Linux Linux Kernel 2.6.22.12
Linux Linux Kernel 2.6.21.6
Linux Linux Kernel 2.6.22.1
Linux Linux Kernel 2.6.23.1
Linux Linux Kernel 2.6.23
Linux Linux Kernel 2.6.21.1
Linux Linux Kernel 2.6.21.4
Linux Linux Kernel 2.6.21.5
Linux Linux Kernel 2.6.22.7
Linux Linux Kernel 2.6.24
Linux Linux Kernel 2.6.22.18
Linux Linux Kernel 2.6.22.20
Linux Linux Kernel 2.6.22.6
Linux Linux Kernel 2.6.23.3
Linux Linux Kernel 2.6.22.3
NA
CVE-2008-0600
The vmsplice_to_pipe function in Linux kernel 2.6.17 up to and including 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE...
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.19
Linux Linux Kernel 2.6.20.13
Linux Linux Kernel 2.6.22.4
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.23.7
Linux Linux Kernel 2.6.17.8
Linux Linux Kernel 2.6.17.4
Linux Linux Kernel 2.6.17.14
Linux Linux Kernel 2.6.24
Linux Linux Kernel 2.6.18.3
Linux Linux Kernel 2.6.22.1
Linux Linux Kernel 2.6.17.3
2 EDB exploits
NA
CVE-2008-1294
Linux kernel 2.6.17, and other versions prior to 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.19
Linux Linux Kernel 2.6.16.43
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.20.13
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.16.34
Linux Linux Kernel 2.6.17.8
Linux Linux Kernel 2.6.17.4
NA
CVE-2008-2137
The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 prior to 2.4.36.5 and 2.6 prior to 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_...
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.12.12
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.20.13
Linux Linux Kernel 2.6.22.4
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.24.2
Linux Linux Kernel 2.6.23.7
Linux Linux Kernel 2.6.17.8
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.17.14
NA
CVE-2008-2365
Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 up to and including 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's proces...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.12.12
Linux Linux Kernel 2.6.19
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.20.13
Linux Linux Kernel 2.6.22.4
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.24.2
Linux Linux Kernel 2.6.23.7
Linux Linux Kernel 2.6.17.8
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »