Vulnerabilities > Linux > Linux Kernel > 2.1.21
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2001-04-17 | CVE-2001-1397 | Local Security vulnerability in kernel The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory. | 2.1 |
2001-04-17 | CVE-2001-1396 | Local Security vulnerability in kernel Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact. | 3.6 |
2001-04-17 | CVE-2001-1395 | Local Security vulnerability in kernel Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact. | 3.6 |
2001-04-17 | CVE-2001-1394 | Denial-Of-Service vulnerability in kernel Signedness error in (1) getsockopt and (2) setsockopt for Linux kernel before 2.2.19 allows local users to cause a denial of service. | 2.1 |
2001-04-17 | CVE-2001-1393 | Denial-Of-Service vulnerability in kernel Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang). | 2.1 |
2001-04-17 | CVE-2001-1392 | Denial-Of-Service vulnerability in kernel The Linux kernel before 2.2.19 does not have unregister calls for (1) CPUID and (2) MSR drivers, which could cause a DoS (crash) by unloading and reloading the drivers. | 2.1 |
2001-04-17 | CVE-2001-1391 | Off-by-one Error vulnerability in Linux Kernel Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory. | 5.5 |
2001-04-17 | CVE-2001-1390 | Local Security vulnerability in kernel Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages. | 6.2 |
1999-12-31 | CVE-1999-1339 | Vulnerability when Network Address Translation (NAT) is enabled in Linux 2.2.10 and earlier with ipchains, or FreeBSD 3.2 with ipfw, allows remote attackers to cause a denial of service (kernel panic) via a ping -R (record route) command. | 5.0 |
1999-07-27 | CVE-1999-1018 | Unspecified vulnerability in Linux Kernel IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets. | 7.5 |