Bug 893728 - (CVE-2012-2669) CVE-2012-2669 hypervkvpd: fails to check origin of netlink messages
CVE-2012-2669 hypervkvpd: fails to check origin of netlink messages
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
Blocks: 877573
  Show dependency treegraph
Reported: 2013-01-09 14:12 EST by Vincent Danen
Modified: 2013-01-09 14:14 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-01-09 14:14:09 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2013-01-09 14:12:28 EST
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.

This is similar to CVE-2012-5532 (see bug #877572 for some of the confusion that happened with regards to the two CVEs).

This is corrected upstream via:


And the fixed code is present in hypervkvpd-0-0.7.el5 as provided by Red Hat Enterprise Linux 5.


Not vulnerable. This issue did not affect the versions of hypvervkvpd as shipped with Red Hat Enterprise Linux 5.

Note You need to log in before you can comment on or make changes to this bug.