Bug 877572 (CVE-2012-5532) - CVE-2012-5532 hypervkvpd: Netlink source address validation allows denial of service
Summary: CVE-2012-5532 hypervkvpd: Netlink source address validation allows denial of ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-5532
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 872593 872749 953560
Blocks: 877573
TreeView+ depends on / blocked
 
Reported: 2012-11-16 22:45 UTC by Vincent Danen
Modified: 2019-09-29 12:57 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-05-14 17:02:35 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0807 normal SHIPPED_LIVE Low: hypervkvpd security and bug fix update 2013-05-09 22:13:44 UTC

Description Vincent Danen 2012-11-16 22:45:23 UTC
Florian Weimer of the Red Hat Product Security Team discovered that hypervkvpd
would exit when it processed a spoofed Netlink packet that had been sent from
an untrusted local user, in the following code:

        len = recvfrom(fd, kvp_recv_buffer, sizeof(kvp_recv_buffer), 0,
                addr_p, &addr_l);

        if (len < 0 || addr.nl_pid) {
            syslog(LOG_ERR, "recvfrom failed; pid:%u error:%d %s",
                    addr.nl_pid, errno, strerror(errno));
            close(fd);
            return -1;
        }


Acknowledgements:

This issue was discovered by Florian Weimer of the Red Hat Product Security
Team.

Comment 3 Vincent Danen 2012-11-27 18:18:57 UTC
Statement:

The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 4 Vincent Danen 2012-11-27 18:57:39 UTC
This was actually reported to oss-sec back in June:

http://seclists.org/oss-sec/2012/q2/476

And it was then assigned the name CVE-2012-2669.

Comment 5 Vincent Danen 2012-11-27 21:35:16 UTC
As explained in:

http://www.openwall.com/lists/oss-security/2012/11/27/12

These are two different flaws.  CVE-2012-2669 is for "failing to check origin of netlink messages" and CVE-2012-5532 is for the "exiting upon receipt of spoofed netlink messages".

This bug is indeed for CVE-2012-5532.

Comment 7 Vincent Danen 2013-01-09 19:16:05 UTC
Bug #893728 was filed for CVE-2012-2669, although it does not affect Red Hat Enterprise Linux 5 at all (so there is a statement to that effect with the appropriate references).

Comment 9 errata-xmlrpc 2013-05-09 18:15:04 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:0807 https://rhn.redhat.com/errata/RHSA-2013-0807.html


Note You need to log in before you can comment on or make changes to this bug.