A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2007-04-22 12:19
Updated : 2018-10-19 11:59
NVD link : CVE-2007-2172
Mitre link : CVE-2007-2172
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
linux
- linux_kernel