Bug 848949 (CVE-2012-6689) - CVE-2012-6689 libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages
Summary: CVE-2012-6689 libmnl: incorrect validation of netlink message origin allows a...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-6689
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 851148
Blocks: 848952
TreeView+ depends on / blocked
 
Reported: 2012-08-16 22:26 UTC by Vincent Danen
Modified: 2020-06-17 06:18 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-02-08 09:16:49 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2012-08-16 22:26:29 UTC
Florian Weimer of the Red Hat Product Security Team discovere that the mnl_nlmsg_portid_ok() function in libmnl 1.0.3 and earlier did not correctly validate the origin of a Netlink message, allowing local attackers to spoof Netlink messages, with context-dependent consequences.

Comment 1 Vincent Danen 2012-08-20 22:52:06 UTC
This is currently being discussed here:

http://marc.info/?l=linux-netdev&m=134522422125983

but in the capacity of the kernel, not libmnl.

Comment 3 Florian Weimer 2015-02-08 09:16:49 UTC
This was fixed in the kernel, see bug 851968.


Note You need to log in before you can comment on or make changes to this bug.