New Search

A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c DECNet) and (2) fib_props (fib_semantics.c IPv4) functions.

oval:org.mitre.oval:def:10764

A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c DECNet) and (2) fib_props (fib_semantics.c IPv4) functions.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • Oracle Linux 5
  • Oracle Linux 4
  • Red Hat Enterprise Linux 3
  • CentOS Linux 3
  • CentOS Linux 4
  • CentOS Linux 5
  • Red Hat Enterprise Linux 5
  • Red Hat Enterprise Linux 4
Class:
vulnerability
Reference(s):
  • CVE-2007-2172
Product(s):