A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2007-04-22 19:19
Updated : 2023-11-07 02:00
NVD link : CVE-2007-2172
Mitre link : CVE-2007-2172
CVE.ORG link : CVE-2007-2172
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation