Vulnerabilities > Linux > Linux Kernel > 2.4.5
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2002-12-11 | CVE-2002-1319 | Denial Of Service vulnerability in Linux Kernel 2.4 System Call TF Flag The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs. | 2.1 |
2002-08-12 | CVE-2002-0510 | Unspecified vulnerability in Linux Kernel The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux. | 5.0 |
2002-08-12 | CVE-2002-0499 | Unspecified vulnerability in Linux Kernel The d_path function in Linux kernel 2.2.20 and earlier, and 2.4.18 and earlier, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories. | 2.1 |
2002-07-26 | CVE-2002-0704 | Improper Cross-boundary Removal of Sensitive Data vulnerability in Linux Kernel The Network Address Translation (NAT) capability for Netfilter ("iptables") 1.2.6a and earlier leaks translated IP addresses in ICMP error messages. | 7.5 |
2002-07-03 | CVE-2002-0570 | Unspecified vulnerability in Linux Kernel The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key. | 2.1 |
2001-12-31 | CVE-2001-1572 | Unspecified vulnerability in Linux Kernel The MAC module in Netfilter in Linux kernel 2.4.1 through 2.4.11, when configured to filter based on MAC addresses, allows remote attackers to bypass packet filters via small packets. | 7.5 |
2001-10-18 | CVE-2001-0907 | Denial of Service vulnerability in Linux Deep Symbolic Link Linux kernel 2.2.1 through 2.2.19, and 2.4.1 through 2.4.10, allows local users to cause a denial of service via a series of deeply nested symlinks, which causes the kernel to spend extra time when trying to access the link. | 2.1 |
2001-07-07 | CVE-2001-1244 | Denial of Service vulnerability in Multiple Vendor Small TCP MSS Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. | 5.0 |