Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.32 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-0871
Race condition in the ptrace functionality in the Linux kernel prior to 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
Linux Linux Kernel
NA
CVE-2013-0231
The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some o...
Xen Xen 3.0.4
Xen Xen 3.0.2
Xen Xen 3.2.0
Xen Xen 3.1.3
Xen Xen 3.2.3
Xen Xen 3.0.3
Xen Xen 3.1.4
Linux Linux Kernel 2.6.18
Linux Linux Kernel 3.8
Xen Xen 3.2.1
Xen Xen 3.2.2
NA
CVE-2012-4461
The KVM subsystem in the Linux kernel prior to 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling...
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.6.2
Linux Linux Kernel 3.6.6
Linux Linux Kernel
Linux Linux Kernel 3.6.4
Linux Linux Kernel 3.6.1
Linux Linux Kernel 3.6
Linux Linux Kernel 3.6.3
Linux Linux Kernel 3.6.5
NA
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel prior to 2.6.36 allows remote malicious users to bypass intended network restrictions via overlapping IPv6 fragments.
Linux Linux Kernel 2.6.32.5
Linux Linux Kernel 2.6.35
Linux Linux Kernel 2.6.35.10
Linux Linux Kernel 2.6.33.7
Linux Linux Kernel 2.6.32.48
Linux Linux Kernel 2.6.31
Linux Linux Kernel 2.6.32
Linux Linux Kernel 2.6.31.9
Linux Linux Kernel 2.6.36
Linux Linux Kernel 2.6.32.42
Linux Linux Kernel 2.6.35.12
Linux Linux Kernel 2.6.35.1
Linux Linux Kernel 2.6.33.9
Linux Linux Kernel 2.6.32.22
Linux Linux Kernel 2.6.31.3
Linux Linux Kernel 2.6.35.4
Linux Linux Kernel 2.6.32.12
Linux Linux Kernel 2.6.32.44
Linux Linux Kernel 2.6.32.52
Linux Linux Kernel 2.6.33
Linux Linux Kernel 2.6.31-rc6
Linux Linux Kernel 2.6.31-rc10
NA
CVE-2012-4508
Race condition in fs/ext4/extents.c in the Linux kernel prior to 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.4.1
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.4
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.2.26
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
NA
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel prior to 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.38
Linux Linux Kernel
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.37
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.42
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.40
Linux Linux Kernel 3.0.33
NA
CVE-2011-4086
The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel prior to 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesyst...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.2
Linux Linux Kernel 3.2.16
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.2.11
Linux Linux Kernel 3.0.23
NA
CVE-2012-2133
Use-after-free vulnerability in the Linux kernel prior to 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers...
Linux Linux Kernel 3.3.2
Linux Linux Kernel 3.3.3
Linux Linux Kernel 3.3.4
Linux Linux Kernel 3.3
Linux Linux Kernel
Linux Linux Kernel 3.3.1
NA
CVE-2012-0045
The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel prior to 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstr...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.2.11
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.2.10
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.33
Linux Linux Kernel 3.0.28
Linux Linux Kernel 3.2.4
1 EDB exploit
NA
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel prior to 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »