| Vulnerability Name: | CVE-2007-6762 (CCN-169454) | ||||||||||||||||
| Assigned: | 2007-01-05 | ||||||||||||||||
| Published: | 2007-01-05 | ||||||||||||||||
| Updated: | 2019-09-27 | ||||||||||||||||
| Summary: | In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array. | ||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2007-6762 Source: CCN Type: The Linux Kernel Archives Web site The Linux Kernel Archives Source: XF Type: UNKNOWN linux-kernel-cve20076762-bo(169454) Source: MISC Type: Patch, Vendor Advisory https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a2f11c227bdf292b3a2900ad04139d301b56ac4 Source: CCN Type: Linux GitHub repository NetLabel: correct CIPSO tag handling when adding new DOI definitions Source: MISC Type: Patch, Third Party Advisory https://github.com/torvalds/linux/commit/2a2f11c227bdf292b3a2900ad04139d301b56ac4 Source: MISC Type: Broken Link https://mirrors.edge.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20 Source: CONFIRM Type: UNKNOWN https://support.f5.com/csp/article/K05342145 Source: CONFIRM Type: UNKNOWN https://support.f5.com/csp/article/K05342145?utm_source=f5support&utm_medium=RSS Source: CCN Type: WhiteSource Vulnerability Database CVE-2007-6762 | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||