4.7

CVE-2007-2172

A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.4.0 < 2.4.35
LinuxLinux Kernel Version >= 2.6.0 <= 2.6.20
LinuxLinux Kernel Version2.6.21 Updategit1
LinuxLinux Kernel Version2.6.21 Updategit2
LinuxLinux Kernel Version2.6.21 Updategit3
LinuxLinux Kernel Version2.6.21 Updategit4
LinuxLinux Kernel Version2.6.21 Updategit5
LinuxLinux Kernel Version2.6.21 Updategit6
LinuxLinux Kernel Version2.6.21 Updategit7
LinuxLinux Kernel Version2.6.21 Updaterc1
LinuxLinux Kernel Version2.6.21 Updaterc2
LinuxLinux Kernel Version2.6.21 Updaterc3
LinuxLinux Kernel Version2.6.21 Updaterc4
LinuxLinux Kernel Version2.6.21 Updaterc5
DebianDebian Linux Version3.1
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06 SwEditionlts
CanonicalUbuntu Linux Version6.10
CanonicalUbuntu Linux Version7.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.07% 0.179
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.7 3.4 6.9
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

http://www.securityfocus.com/bid/23447
Patch
Third Party Advisory
Vendor Advisory
VDB Entry