Vulnerability Description
The selinux_parse_skb_ipv6 function in security/selinux/hooks.c in the Linux kernel before 2.6.12-rc4 allows remote attackers to cause a denial of service (OOPS) via vectors associated with an incorrect call to the ipv6_skip_exthdr function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.12 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.12/ChangeLog-2.6.12-rc4
- http://www.openwall.com/lists/oss-security/2010/02/22/3
- https://bugzilla.redhat.com/show_bug.cgi?id=160117
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56614
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.12/ChangeLog-2.6.12-rc4
- http://www.openwall.com/lists/oss-security/2010/02/22/3
- https://bugzilla.redhat.com/show_bug.cgi?id=160117
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56614
FAQ
What is CVE-2005-4886?
CVE-2005-4886 is a vulnerability with a CVSS score of 7.8 (HIGH). The selinux_parse_skb_ipv6 function in security/selinux/hooks.c in the Linux kernel before 2.6.12-rc4 allows remote attackers to cause a denial of service (OOPS) via vectors associated with an incorre...
How severe is CVE-2005-4886?
CVE-2005-4886 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4886?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.