Unrated severityNVD Advisory· Published Apr 22, 2007· Updated Apr 23, 2026
CVE-2007-2172
CVE-2007-2172
Description
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
Affected products
18cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 12 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=2.4.0,<2.4.35
- cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
32- www.securityfocus.com/bid/23447nvdPatchThird Party AdvisoryVDB EntryVendor Advisory
- kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6nvdVendor Advisory
- rhn.redhat.com/errata/RHSA-2007-0488.htmlnvdThird Party Advisory
- secunia.com/advisories/25068nvdThird Party Advisory
- secunia.com/advisories/25288nvdThird Party Advisory
- secunia.com/advisories/25392nvdThird Party Advisory
- secunia.com/advisories/25838nvdThird Party Advisory
- secunia.com/advisories/26289nvdThird Party Advisory
- secunia.com/advisories/26450nvdThird Party Advisory
- secunia.com/advisories/26620nvdThird Party Advisory
- secunia.com/advisories/26647nvdThird Party Advisory
- secunia.com/advisories/27913nvdThird Party Advisory
- secunia.com/advisories/29058nvdThird Party Advisory
- secunia.com/advisories/33280nvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2007-287.htmnvdThird Party Advisory
- www.debian.org/security/2007/dsa-1356nvdThird Party Advisory
- www.debian.org/security/2007/dsa-1363nvdThird Party Advisory
- www.debian.org/security/2008/dsa-1503nvdThird Party Advisory
- www.debian.org/security/2008/dsa-1504nvdThird Party Advisory
- www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35nvdVendor Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0347.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-1049.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0787.htmlnvdThird Party Advisory
- www.ubuntu.com/usn/usn-464-1nvdThird Party Advisory
- www.vupen.com/english/advisories/2007/2690nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/33979nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10764nvdThird Party Advisory
- www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08269.htmlnvd
- www.mail-archive.com/git-commits-head%40vger.kernel.org/msg08270.htmlnvd
News mentions
0No linked articles in our index yet.