A “potential” buffer overflow exists in the panic() function in Linux 2.4.x, although it may not be exploitable due to the functionality of panic.
ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc
ftp://patches.sgi.com/support/free/security/advisories/20040505-01-U.asc
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
lwn.net/Articles/81773/
secunia.com/advisories/20162
secunia.com/advisories/20163
secunia.com/advisories/20202
secunia.com/advisories/20338
security.gentoo.org/glsa/glsa-200407-02.xml
www.debian.org/security/2006/dsa-1067
www.debian.org/security/2006/dsa-1069
www.debian.org/security/2006/dsa-1070
www.debian.org/security/2006/dsa-1082
www.linuxsecurity.com/advisories/engarde_advisory-4285.html
www.mandriva.com/security/advisories?name=MDKSA-2004:037
www.novell.com/linux/security/advisories/2004_10_kernel.html
www.securityfocus.com/bid/10233
exchange.xforce.ibmcloud.com/vulnerabilities/15953