CVE-2007-6762

In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a2f11c227bdf292b3a2900ad04139d301b56ac4 - Patch, Vendor Advisory () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a2f11c227bdf292b3a2900ad04139d301b56ac4 - Patch, Vendor Advisory
References () https://github.com/torvalds/linux/commit/2a2f11c227bdf292b3a2900ad04139d301b56ac4 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/2a2f11c227bdf292b3a2900ad04139d301b56ac4 - Patch, Third Party Advisory
References () https://mirrors.edge.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20 - Broken Link () https://mirrors.edge.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20 - Broken Link
References () https://support.f5.com/csp/article/K05342145 - () https://support.f5.com/csp/article/K05342145 -
References () https://support.f5.com/csp/article/K05342145?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K05342145?utm_source=f5support&amp%3Butm_medium=RSS -

07 Nov 2023, 02:01

Type Values Removed Values Added
References
  • {'url': 'https://support.f5.com/csp/article/K05342145?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K05342145?utm_source=f5support&utm_medium=RSS', 'tags': [], 'refsource': 'CONFIRM'}
  • () https://support.f5.com/csp/article/K05342145?utm_source=f5support&amp%3Butm_medium=RSS -

Information

Published : 2019-07-27 22:15

Updated : 2024-11-21 00:40


NVD link : CVE-2007-6762

Mitre link : CVE-2007-6762

CVE.ORG link : CVE-2007-6762


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer