VYPR
Unrated severityNVD Advisory· Published Apr 22, 2007· Updated Apr 23, 2026

CVE-2007-2172

CVE-2007-2172

Description

A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.

Affected products

18
  • Linux/Kernel13 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 12 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=2.4.0,<2.4.35
    • cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

32

News mentions

0

No linked articles in our index yet.