First published: Tue Jun 28 2005(Updated: )
Description of problem: Fix numerous padding memleaks. Missing initialization in dumped data <a href="http://git.kernel.org/linus/9ef1d4c7c7aca1cd436612b6ca785b726ffb8ed8">http://git.kernel.org/linus/9ef1d4c7c7aca1cd436612b6ca785b726ffb8ed8</a> Clear padding in netlink messages <a href="http://git.kernel.org/linus/b3563c4fbff906991a1b4ef4609f99cca2a0de6a">http://git.kernel.org/linus/b3563c4fbff906991a1b4ef4609f99cca2a0de6a</a> Missing padding fields in dumped structures <a href="http://git.kernel.org/linus/8a47077a0b5aa2649751c46e7a27884e6686ccbf">http://git.kernel.org/linus/8a47077a0b5aa2649751c46e7a27884e6686ccbf</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.4.1 | |
Linux Kernel | =2.4.2 | |
Linux Kernel | =2.4.3 | |
Linux Kernel | =2.4.4 | |
Linux Kernel | =2.4.5 | |
Linux Kernel | =2.4.6 | |
Linux Kernel | =2.4.7 | |
Linux Kernel | =2.4.8 | |
Linux Kernel | =2.4.9 | |
Linux Kernel | =2.4.10 | |
Linux Kernel | =2.4.11 | |
Linux Kernel | =2.4.12 | |
Linux Kernel | =2.4.13 | |
Linux Kernel | =2.4.14 | |
Linux Kernel | =2.4.15 | |
Linux Kernel | =2.4.16 | |
Linux Kernel | =2.4.17 | |
Linux Kernel | =2.4.18 | |
Linux Kernel | =2.4.19 | |
Linux Kernel | =2.4.20 | |
Linux Kernel | =2.4.21 | |
Linux Kernel | =2.4.22 | |
Linux Kernel | =2.4.23 | |
Linux Kernel | =2.4.24 | |
Linux Kernel | =2.4.25 | |
Linux Kernel | =2.4.26 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.28 | |
Linux Kernel | =2.4.29 | |
Linux Kernel | =2.4.30 | |
Linux Kernel | =2.4.30-rc2 | |
Linux Kernel | =2.4.30-rc3 | |
Linux Kernel | =2.4.31 | |
Linux Kernel | =2.4.32 | |
Linux Kernel | =2.4.33 | |
Linux Kernel | =2.4.33.1 | |
Linux Kernel | =2.4.33.2 | |
Linux Kernel | =2.4.33.3 | |
Linux Kernel | =2.4.33.4 | |
Linux Kernel | =2.4.33.5 | |
Linux Kernel | =2.4.33.7 | |
Linux Kernel | =2.4.34 | |
Linux Kernel | =2.4.34.1 | |
Linux Kernel | =2.4.34.2 | |
Linux Kernel | =2.4.34.3 | |
Linux Kernel | =2.4.34.4 | |
Linux Kernel | =2.4.34.5 | |
Linux Kernel | =2.4.34.6 | |
Linux Kernel | =2.4.35.1 | |
Linux Kernel | =2.4.35.2 | |
Linux Kernel | =2.4.35.3 | |
Linux Kernel | =2.4.35.4 | |
Linux Kernel | =2.4.35.5 | |
Linux Kernel | =2.4.36 | |
Linux Kernel | =2.4.36.1 | |
Linux Kernel | =2.4.36.2 | |
Linux Kernel | =2.4.36.3 | |
Linux Kernel | =2.4.36.4 | |
Linux Kernel | =2.4.36.5 | |
Linux Kernel | =2.4.36.6 | |
Linux Kernel | =2.4.36.7 | |
Linux Kernel | =2.4.36.8 | |
Linux Kernel | =2.4.36.9 | |
Linux Kernel | =2.4.37 | |
Linux Kernel | =2.4.37.1 | |
Linux Kernel | =2.4.37.2 | |
Linux Kernel | =2.4.37.3 | |
Linux Kernel | =2.4.37.4 | |
Linux Kernel | =2.4.37.5 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.10 | |
Linux Kernel | =2.6.11 | |
Linux Kernel | =2.6.11.1 | |
Linux Kernel | =2.6.11.2 | |
Linux Kernel | =2.6.11.3 | |
Linux Kernel | =2.6.11.4 | |
Linux Kernel | =2.6.11.5 | |
Linux Kernel | =2.6.11.6 | |
Linux Kernel | =2.6.11.7 | |
Linux Kernel | =2.6.11.8 | |
Linux Kernel | =2.6.11.9 | |
Linux Kernel | =2.6.11.10 | |
Linux Kernel | =2.6.11.11 | |
Linux Kernel | =2.6.11.12 | |
Linux Kernel | =2.6.12 | |
Linux Kernel | =2.6.12.1 | |
Linux Kernel | =2.6.12.2 | |
Linux Kernel | =2.6.12.3 | |
Linux Kernel | =2.6.12.4 | |
Linux Kernel | =2.6.12.5 | |
Linux Kernel | =2.6.12.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4881 is classified as a medium severity vulnerability due to its potential impact on system security.
To mitigate CVE-2005-4881, upgrade to a patched version of the Linux kernel that addresses the vulnerability.
CVE-2005-4881 affects multiple versions of the Linux kernel, specifically versions from 2.4.1 to 2.6.12.6.
CVE-2005-4881 is a memory leak vulnerability that can lead to information disclosure through improper handling of netlink messages.
While the recommended solution is to upgrade the kernel, temporarily disabling certain netlink functionalities may serve as a workaround.