This site is operated by the Linux Kernel Organization, Inc., a 501(c)3 nonprofit corporation, with support from the following sponsors.501(c)3 nonprofit corporation

CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions. [PATCH] staging: rtl8723bs: include: Fix coding style errors urn:uuid:3534b040-4520-aa13-3ce8-3afd13808c97 2020-07-26T21:12:12Z Aditya Jain aditya.jainadityajain.jain@gmail.com Linux Kernel 2.4.26 Released – OSnews As you said, 2.4 is the default kernel series in most distributions, but all distros that target at people who just want things to work (RedHat, SuSE, Mandrake) are shipping 2.6 now. Embedded systems (e.g. Zaurus) are still using older 2.4 kernels (OpenZaurus 3.3.5: 2.4.18-rmk7-pxa3-embedix), so my question remains: Who is going to use this kernel?

[Marshmallow/Nougat] [MSM8974] LeeG Kernel 2.8/2.4./2.2

improve compat handling for the i386 u64 alignment quirk Hi all, the i386 ABI is a little special in that it uses less than natural alignment for 64-bit integer types (u64 and s64), and a significant amount of our compat handlers deals with just that. Linux Kernel 2.4/2.6 (RedHat Linux 9 / Fedora Core 4 < 11

Ubuntu to Mainline kernel version mapping

Linux Kernel 2.4/2.6 (RedHat Linux 9 / Fedora Core 4 < 11 Linux Kernel 2.4/2.6 (RedHat Linux 9 / Fedora Core 4 < 11 / Whitebox 4 / CentOS 4) - 'sock_sendpage()' Ring0 Privilege Escalation (5). CVE-2009-2692CVE-56992 . local exploit for Linux platform Linux-Kernel Archive: [PATCH] AGPGART, kernel 2.4.22 [PATCH] AGPGART, kernel 2.4.22 -- add support for Intel 875P From: José Fonseca Date: Tue Nov 18 2003 - 12:17:49 EST Next message: Zwane Mwaikambo: "Re: [PATCH][2.6-mm] Fix 4G/4G X11/vm86 oops" Previous message: Martin J. Bligh: "Re: [PATCH][2.6-mm] Fix … Debian DSA-311-1 : linux-kernel-2.4.18 - several CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address. CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions. [PATCH] staging: rtl8723bs: include: Fix coding style errors