CVE-2005-4881

Description

The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.

Category

4.9
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 0.07%
Vendor Advisory redhat.com Vendor Advisory opensuse.org Vendor Advisory kernel.org Vendor Advisory kernel.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.openwall.com/lists/oss-security/2009/09/17/9 patch mailing list
http://www.openwall.com/lists/oss-security/2009/09/17/1 patch mailing list
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git%3Ba=commit%3Bh=30e744716c4a6cc4e8ecaaddf68f20057c03dc8d
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9ef1d4c7c7aca1cd436612b6ca785b726ffb8ed8
http://secunia.com/advisories/37084 third party advisory
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.13/ChangeLog-2.6.13-rc1 patch vendor advisory
http://www.redhat.com/support/errata/RHSA-2009-1522.html vendor advisory
http://secunia.com/advisories/37909 third party advisory
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6 vendor advisory
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git%3Ba=commit%3Bh=3408cce0c2f380884070896420ca566704452fb5
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11744 signature vdb entry
https://bugzilla.redhat.com/show_bug.cgi?id=521601
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a47077a0b5aa2649751c46e7a27884e6686ccbf
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html vendor advisory
http://marc.info/?l=git-commits-head&m=112002138324380 patch mailing list
http://www.openwall.com/lists/oss-security/2009/09/06/2 patch mailing list
http://www.openwall.com/lists/oss-security/2009/09/07/2 patch mailing list
http://www.openwall.com/lists/oss-security/2009/09/05/2 patch mailing list
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git%3Ba=commit%3Bh=0f3f2328f63c521fe4b435f148687452f98b2349
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b3563c4fbff906991a1b4ef4609f99cca2a0de6a

Frequently Asked Questions

What is the severity of CVE-2005-4881?
CVE-2005-4881 has been scored as a medium severity vulnerability.
How to fix CVE-2005-4881?
To fix CVE-2005-4881, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2005-4881 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2005-4881 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.