First published: Sun Apr 22 2007(Updated: )
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.21-rc2 | |
Linux Linux kernel | =2.6.21-git3 | |
Linux Linux kernel | =2.6.21-git5 | |
Linux Linux kernel | =2.6.21-git4 | |
Linux Linux kernel | =2.6.21-rc5 | |
Linux Linux kernel | =2.6.21-rc4 | |
Linux Linux kernel | =2.6.21-git2 | |
Linux Linux kernel | =2.6.21-git7 | |
Linux Linux kernel | =2.6.21-rc1 | |
Linux Linux kernel | =2.6.21-git1 | |
Linux Linux kernel | =2.6.21-rc3 | |
Linux Linux kernel | =2.6.21-git6 | |
Linux Linux kernel | >=2.4.0<2.4.35 | |
Linux Linux kernel | >=2.6.0<=2.6.20 | |
Debian Debian Linux | =3.1 | |
Debian Debian Linux | =4.0 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =7.04 | |
Canonical Ubuntu Linux | =6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.