Vulnerabilities > Linux > Linux Kernel > 2.4.23.ow2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-01-29 | CVE-2007-6694 | Resource Management Errors vulnerability in Linux Kernel The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference. | 7.8 |
2006-12-20 | CVE-2006-4814 | Resource Management Errors vulnerability in Linux Kernel The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock. | 4.6 |
2006-03-15 | CVE-2006-1242 | Unspecified vulnerability in Linux Kernel The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks. | 5.0 |
2005-12-31 | CVE-2005-0489 | Local Denial of Service vulnerability in Linux Kernel Invalid Proc Memory Access The /proc handling (proc/base.c) Linux kernel 2.4 before 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory. | 4.9 |
2005-12-22 | CVE-2005-3660 | Local Socket Buffer Memory Exhaustion Denial of Service vulnerability in Linux Kernel Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. | 4.9 |
2005-10-25 | CVE-2005-2708 | Resource Management Errors vulnerability in Linux Kernel The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command. | 2.1 |
2005-07-11 | CVE-2005-1768 | Local Buffer Overflow vulnerability in Linux Kernel IA32 ExecVE Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow. | 3.7 |
2005-05-11 | CVE-2005-1263 | Local Buffer Overflow vulnerability in Linux Kernel ELF Core Dump The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. | 7.2 |
2005-05-02 | CVE-2005-0815 | ISO9660 Filesystem Handling vulnerability in Linux Kernel Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem. | 6.4 |
2005-05-02 | CVE-2005-0207 | Local NFS I/O Denial of Service vulnerability in Linux Kernel Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT. | 2.1 |