296,869
Total vulnerabilities in the database
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
| Software | From | Fixed in | 
|---|---|---|
| linux / linux_kernel | 2.6.21-rc2 | 2.6.21-rc2.x | 
| linux / linux_kernel | 2.6.21-git3 | 2.6.21-git3.x | 
| linux / linux_kernel | 2.6.21-git5 | 2.6.21-git5.x | 
| linux / linux_kernel | 2.6.21-git4 | 2.6.21-git4.x | 
| linux / linux_kernel | 2.6.21-rc5 | 2.6.21-rc5.x | 
| linux / linux_kernel | 2.6.21-rc4 | 2.6.21-rc4.x | 
| linux / linux_kernel | 2.6.21-git2 | 2.6.21-git2.x | 
| linux / linux_kernel | 2.6.21-git7 | 2.6.21-git7.x | 
| linux / linux_kernel | 2.6.21-rc1 | 2.6.21-rc1.x | 
| linux / linux_kernel | 2.6.21-git1 | 2.6.21-git1.x | 
| linux / linux_kernel | 2.6.21-rc3 | 2.6.21-rc3.x | 
| linux / linux_kernel | 2.6.21-git6 | 2.6.21-git6.x | 
| linux / linux_kernel | 2.4.0 | 2.4.35 | 
| linux / linux_kernel | 2.6.0 | 2.6.20.x | 
| debian / debian_linux | 3.1 | 3.1.x | 
| debian / debian_linux | 4.0 | 4.0.x | 
| canonical / ubuntu_linux | 6.06 | 6.06.x | 
| canonical / ubuntu_linux | 7.04 | 7.04.x | 
| canonical / ubuntu_linux | 6.10 | 6.10.x |