Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.21 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
Redhat Linux 7.3
Redhat Linux 8.0
NA
CVE-2007-5001
Linux kernel prior to 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux As 3
Redhat Enterprise Linux Es 3
Redhat Enterprise Linux Ws 3
NA
CVE-2004-0491
The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.
Redhat Enterprise Linux 3.0
NA
CVE-2007-6694
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 up to and including 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL poi...
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.33.2
Linux Linux Kernel 2.4.33.3
Linux Linux Kernel 2.4.35
Linux Linux Kernel 2.4.35.2
Linux Linux Kernel 2.4.9 Pre5
Linux Linux Kernel 2.5.0
Linux Linux Kernel 2.5.15
Linux Linux Kernel 2.5.16
Linux Linux Kernel 2.5.23
Linux Linux Kernel 2.5.24
Linux Linux Kernel 2.5.30
Linux Linux Kernel 2.5.31
Linux Linux Kernel 2.5.38
Linux Linux Kernel 2.5.39
Linux Linux Kernel 2.5.46
Linux Linux Kernel 2.5.47
NA
CVE-2003-0550
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows malicious users to modify the bridge topology.
Redhat Linux 2.4.2
NA
CVE-2003-0551
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow malicious users to cause a denial of service.
Redhat Linux 2.4.2
NA
CVE-2003-0552
Linux 2.4.x allows remote malicious users to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
Redhat Linux 2.4.2
NA
CVE-2003-0959
Multiple integer overflows in the 32bit emulation for AMD64 architectures in Linux 2.4 kernel prior to 2.4.21 allows malicious users to cause a denial of service or gain root privileges via unspecified vectors that trigger copy_from_user function calls with improper length argume...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9