A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 00:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6 - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2007-0488.html - Third Party Advisory | |
References | () http://secunia.com/advisories/25068 - Third Party Advisory | |
References | () http://secunia.com/advisories/25288 - Third Party Advisory | |
References | () http://secunia.com/advisories/25392 - Third Party Advisory | |
References | () http://secunia.com/advisories/25838 - Third Party Advisory | |
References | () http://secunia.com/advisories/26289 - Third Party Advisory | |
References | () http://secunia.com/advisories/26450 - Third Party Advisory | |
References | () http://secunia.com/advisories/26620 - Third Party Advisory | |
References | () http://secunia.com/advisories/26647 - Third Party Advisory | |
References | () http://secunia.com/advisories/27913 - Third Party Advisory | |
References | () http://secunia.com/advisories/29058 - Third Party Advisory | |
References | () http://secunia.com/advisories/33280 - Third Party Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm - Third Party Advisory | |
References | () http://www.debian.org/security/2007/dsa-1356 - Third Party Advisory | |
References | () http://www.debian.org/security/2007/dsa-1363 - Third Party Advisory | |
References | () http://www.debian.org/security/2008/dsa-1503 - Third Party Advisory | |
References | () http://www.debian.org/security/2008/dsa-1504 - Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35 - Vendor Advisory | |
References | () http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.html - | |
References | () http://www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.html - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:171 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:196 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:216 - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0347.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-1049.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0787.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/23447 - Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () http://www.ubuntu.com/usn/usn-464-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2007/2690 - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33979 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764 - Third Party Advisory |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2007-04-22 19:19
Updated : 2024-11-21 00:30
NVD link : CVE-2007-2172
Mitre link : CVE-2007-2172
CVE.ORG link : CVE-2007-2172
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation