Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 3.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-2928
The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel prior to 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malfor...
Linux Linux Kernel 3.1
Linux Linux Kernel
6.3
CVSSv3
CVE-2024-24861
A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return value overflow issue, possibly leading to malfunction or denial of service issue.
Linux Linux Kernel 3.1
Linux Linux Kernel 6.8
Linux Linux Kernel
5.5
CVSSv3
CVE-2005-3847
The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions prior to 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
Linux Linux Kernel
Debian Debian Linux 3.1
4.7
CVSSv3
CVE-2005-3274
Race condition in ip_vs_conn_flush in Linux 2.6 prior to 2.6.13 and 2.4 prior to 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before...
Linux Linux Kernel
Debian Debian Linux 3.1
5.5
CVSSv3
CVE-2005-2456
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an inde...
Linux Linux Kernel 2.6.0
Debian Debian Linux 3.1
NA
CVE-2005-3055
Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.13.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.13.2
Debian Debian Linux 3.1
NA
CVE-2005-2459
The huft_build function in inflate.c in the zlib routines in the Linux kernel prior to 2.6.12.5 returns the wrong value, which allows remote malicious users to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a diffe...
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6 Test9 Cvs
NA
CVE-2005-2555
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Debian Debian Linux 3.1
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
NA
CVE-2007-2172
A typo in Linux kernel 2.6 prior to 2.6.21-rc6 and 2.4 prior to 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
Linux Linux Kernel 2.6.21
Linux Linux Kernel
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
4.7
CVSSv3
CVE-2005-3106
Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
Linux Linux Kernel 2.6.0
Debian Debian Linux 3.1
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »