7.8
CWE
189
Advisory Published
CVE Published
Updated

CVE-2005-4886

First published: Sun Apr 24 2005(Updated: )

Escalated to Bugzilla from IssueTracker [SELINUX]: Fix ipv6_skip_exthdr() invocation causing OOPS. author Herbert Xu <herbert.org.au> Mon, 25 Apr 2005 03:16:19 +0000 (20:16 -0700) committer David S. Miller <davem> Mon, 25 Apr 2005 03:16:19 +0000 (20:16 -0700) The SELinux hooks invoke ipv6_skip_exthdr() with an incorrect length final argument. However, the length argument turns out to be superfluous. I was just reading ipv6_skip_exthdr and it occured to me that we can get rid of len altogether. The only place where len is used is to check whether the skb has two bytes for ipv6_opt_hdr. This check is done by skb_header_pointer/skb_copy_bits anyway. Now it might appear that we've made the code slower by deferring the check to skb_copy_bits. However, this check should not trigger in the common case so this is OK.

Credit: secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Linux Linux kernel=2.6.4-rc3
Linux Linux kernel=2.6.11
Linux Linux kernel=2.6.12-rc1
Linux Linux kernel=2.6.4-rc1
Linux Linux kernel=2.6.11.2
Linux Linux kernel=2.6.5
Linux Linux kernel=2.6.11.10
Linux Linux kernel=2.6.10-rc3
Linux Linux kernel=2.6.1
Linux Linux kernel=2.6.7-rc3
Linux Linux kernel=2.6.3-rc2
Linux Linux kernel=2.6.11.8
Linux Linux kernel=2.6.10
Linux Linux kernel=2.6.11.6
Linux Linux kernel=2.6.11.11
Linux Linux kernel=2.6.0-test5
Linux Linux kernel=2.6.3
Linux Linux kernel=2.6.0-test2
Linux Linux kernel=2.6.9-rc1
Linux Linux kernel=2.6.4
Linux Linux kernel=2.6.11.5
Linux Linux kernel=2.6.7-rc1
Linux Linux kernel=2.6.9-rc3
Linux Linux kernel<=2.6.12
Linux Linux kernel=2.6.2
Linux Linux kernel=2.6.6-rc3
Linux Linux kernel=2.6.1-rc3
Linux Linux kernel=2.6.0-test11
Linux Linux kernel=2.6.2-rc3
Linux Linux kernel=2.6.4-rc2
Linux Linux kernel=2.6.12-rc2
Linux Linux kernel=2.6.1-rc2
Linux Linux kernel=2.6.8
Linux Linux kernel=2.6.3-rc3
Linux Linux kernel=2.6.0-test1
Linux Linux kernel=2.6.7-rc2
Linux Linux kernel=2.6.0-test6
Linux Linux kernel=2.6.11.9
Linux Linux kernel=2.6.10-rc2
Linux Linux kernel=2.6.0-test4
Linux Linux kernel=2.6.2-rc1
Linux Linux kernel=2.6.0
Linux Linux kernel=2.6.5-rc1
Linux Linux kernel=2.6.6-rc2
Linux Linux kernel=2.6.9-rc2
Linux Linux kernel=2.6.0-test10
Linux Linux kernel=2.6.0-test9
Linux Linux kernel=2.6.10-rc1
Linux Linux kernel=2.6.11.3
Linux Linux kernel=2.6.9-rc4
Linux Linux kernel=2.6.7
Linux Linux kernel=2.6.3-rc4
Linux Linux kernel=2.6.1-rc1
Linux Linux kernel=2.6.6-rc1
Linux Linux kernel=2.6.11.7
Linux Linux kernel=2.6.5-rc2
Linux Linux kernel=2.6.0-test7
Linux Linux kernel=2.6.5-rc3
Linux Linux kernel=2.6.2-rc2
Linux Linux kernel=2.6.8.1
Linux Linux kernel=2.6.3-rc1
Linux Linux kernel=2.6.11.4
Linux Linux kernel=2.6.11.12
Linux Linux kernel=2.6.0-test8
Linux Linux kernel=2.6.11.1
Linux Linux kernel=2.6.9
Linux Linux kernel=2.6.6
Linux Linux kernel=2.6.0-test3
redhat/RHSA-2005<514
514

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203