7.8
CWE
189
Advisory Published
CVE Published
Updated

CVE-2005-4886

First published: Sun Apr 24 2005(Updated: )

Escalated to Bugzilla from IssueTracker [SELINUX]: Fix ipv6_skip_exthdr() invocation causing OOPS. author Herbert Xu <herbert.org.au> Mon, 25 Apr 2005 03:16:19 +0000 (20:16 -0700) committer David S. Miller <davem> Mon, 25 Apr 2005 03:16:19 +0000 (20:16 -0700) The SELinux hooks invoke ipv6_skip_exthdr() with an incorrect length final argument. However, the length argument turns out to be superfluous. I was just reading ipv6_skip_exthdr and it occured to me that we can get rid of len altogether. The only place where len is used is to check whether the skb has two bytes for ipv6_opt_hdr. This check is done by skb_header_pointer/skb_copy_bits anyway. Now it might appear that we've made the code slower by deferring the check to skb_copy_bits. However, this check should not trigger in the common case so this is OK.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/RHSA-2005<514
514
Linux kernel=2.6.4-rc3
Linux kernel=2.6.11
Linux kernel=2.6.12-rc1
Linux kernel=2.6.4-rc1
Linux kernel=2.6.11.2
Linux kernel=2.6.5
Linux kernel=2.6.11.10
Linux kernel=2.6.10-rc3
Linux kernel=2.6.1
Linux kernel=2.6.7-rc3
Linux kernel=2.6.3-rc2
Linux kernel=2.6.11.8
Linux kernel=2.6.10
Linux kernel=2.6.11.6
Linux kernel=2.6.11.11
Linux kernel=2.6.0-test5
Linux kernel=2.6.3
Linux kernel=2.6.0-test2
Linux kernel=2.6.9-rc1
Linux kernel=2.6.4
Linux kernel=2.6.11.5
Linux kernel=2.6.7-rc1
Linux kernel=2.6.9-rc3
Linux kernel<=2.6.12
Linux kernel=2.6.2
Linux kernel=2.6.6-rc3
Linux kernel=2.6.1-rc3
Linux kernel=2.6.0-test11
Linux kernel=2.6.2-rc3
Linux kernel=2.6.4-rc2
Linux kernel=2.6.12-rc2
Linux kernel=2.6.1-rc2
Linux kernel=2.6.8
Linux kernel=2.6.3-rc3
Linux kernel=2.6.0-test1
Linux kernel=2.6.7-rc2
Linux kernel=2.6.0-test6
Linux kernel=2.6.11.9
Linux kernel=2.6.10-rc2
Linux kernel=2.6.0-test4
Linux kernel=2.6.2-rc1
Linux kernel=2.6.0
Linux kernel=2.6.5-rc1
Linux kernel=2.6.6-rc2
Linux kernel=2.6.9-rc2
Linux kernel=2.6.0-test10
Linux kernel=2.6.0-test9
Linux kernel=2.6.10-rc1
Linux kernel=2.6.11.3
Linux kernel=2.6.9-rc4
Linux kernel=2.6.7
Linux kernel=2.6.3-rc4
Linux kernel=2.6.1-rc1
Linux kernel=2.6.6-rc1
Linux kernel=2.6.11.7
Linux kernel=2.6.5-rc2
Linux kernel=2.6.0-test7
Linux kernel=2.6.5-rc3
Linux kernel=2.6.2-rc2
Linux kernel=2.6.8.1
Linux kernel=2.6.3-rc1
Linux kernel=2.6.11.4
Linux kernel=2.6.11.12
Linux kernel=2.6.0-test8
Linux kernel=2.6.11.1
Linux kernel=2.6.9
Linux kernel=2.6.6
Linux kernel=2.6.0-test3
Linux Kernel<=2.6.12
Linux Kernel=2.6.0
Linux Kernel=2.6.0-test1
Linux Kernel=2.6.0-test10
Linux Kernel=2.6.0-test11
Linux Kernel=2.6.0-test2
Linux Kernel=2.6.0-test3
Linux Kernel=2.6.0-test4
Linux Kernel=2.6.0-test5
Linux Kernel=2.6.0-test6
Linux Kernel=2.6.0-test7
Linux Kernel=2.6.0-test8
Linux Kernel=2.6.0-test9
Linux Kernel=2.6.1
Linux Kernel=2.6.1-rc1
Linux Kernel=2.6.1-rc2
Linux Kernel=2.6.1-rc3
Linux Kernel=2.6.2
Linux Kernel=2.6.2-rc1
Linux Kernel=2.6.2-rc2
Linux Kernel=2.6.2-rc3
Linux Kernel=2.6.3
Linux Kernel=2.6.3-rc1
Linux Kernel=2.6.3-rc2
Linux Kernel=2.6.3-rc3
Linux Kernel=2.6.3-rc4
Linux Kernel=2.6.4
Linux Kernel=2.6.4-rc1
Linux Kernel=2.6.4-rc2
Linux Kernel=2.6.4-rc3
Linux Kernel=2.6.5
Linux Kernel=2.6.5-rc1
Linux Kernel=2.6.5-rc2
Linux Kernel=2.6.5-rc3
Linux Kernel=2.6.6
Linux Kernel=2.6.6-rc1
Linux Kernel=2.6.6-rc2
Linux Kernel=2.6.6-rc3
Linux Kernel=2.6.7
Linux Kernel=2.6.7-rc1
Linux Kernel=2.6.7-rc2
Linux Kernel=2.6.7-rc3
Linux Kernel=2.6.8
Linux Kernel=2.6.8.1
Linux Kernel=2.6.9
Linux Kernel=2.6.9-rc1
Linux Kernel=2.6.9-rc2
Linux Kernel=2.6.9-rc3
Linux Kernel=2.6.9-rc4
Linux Kernel=2.6.10
Linux Kernel=2.6.10-rc1
Linux Kernel=2.6.10-rc2
Linux Kernel=2.6.10-rc3
Linux Kernel=2.6.11
Linux Kernel=2.6.11.1
Linux Kernel=2.6.11.2
Linux Kernel=2.6.11.3
Linux Kernel=2.6.11.4
Linux Kernel=2.6.11.5
Linux Kernel=2.6.11.6
Linux Kernel=2.6.11.7
Linux Kernel=2.6.11.8
Linux Kernel=2.6.11.9
Linux Kernel=2.6.11.10
Linux Kernel=2.6.11.11
Linux Kernel=2.6.11.12
Linux Kernel=2.6.12-rc1
Linux Kernel=2.6.12-rc2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2005-4886?

    CVE-2005-4886 has a medium severity rating due to potential security impacts in affected Linux kernel versions.

  • How do I fix CVE-2005-4886?

    To fix CVE-2005-4886, update your Linux kernel to version 2.6.12 or later, which includes the necessary patches.

  • What versions of the Linux kernel are affected by CVE-2005-4886?

    CVE-2005-4886 affects Linux kernel versions up to and including 2.6.12.

  • What does CVE-2005-4886 impact?

    CVE-2005-4886 impacts the SELinux functionality within the Linux kernel, particularly related to ipv6_skip_exthdr().

  • Who reported CVE-2005-4886?

    CVE-2005-4886 was reported by Herbert Xu and subsequently addressed by David S. Miller.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203