Vulnerabilities > Linux > Linux Kernel > 2.4.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2004-01-05 | CVE-2003-0984 | Unspecified vulnerability in Linux Kernel Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space. | 4.6 |
2003-12-15 | CVE-2003-0961 | Unspecified vulnerability in Linux Kernel Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges. | 7.2 |
2003-08-27 | CVE-2003-0619 | Unspecified vulnerability in Linux Kernel Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call. | 5.0 |
2003-08-27 | CVE-2003-0462 | A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). | 1.2 |
2003-08-18 | CVE-2003-0465 | Unspecified vulnerability in Linux Kernel 2.4.0/2.5.0 The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks. | 5.0 |
2003-08-07 | CVE-2003-0476 | Local Security vulnerability in Linux Kernel 2.4.0 The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors. | 2.1 |
2003-06-16 | CVE-2003-0246 | Unspecified vulnerability in Linux Kernel The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. | 3.6 |
2003-05-27 | CVE-2003-0244 | Remote Denial Of Service vulnerability in Linux Kernel 2.4.0 The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions. | 5.0 |
2003-03-31 | CVE-2003-0127 | Unspecified vulnerability in Linux Kernel The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. | 7.2 |
2002-12-31 | CVE-2002-2254 | Permissions, Privileges, and Access Controls vulnerability in Linux Kernel The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted. | 2.1 |