This service will be undergoing maintenance at 00:00 UTC, 2016-08-01. It is expected to last about 1 hours
Bug 893728 - (CVE-2012-2669) CVE-2012-2669 hypervkvpd: fails to check origin of netlink messages
CVE-2012-2669 hypervkvpd: fails to check origin of netlink messages
Status: CLOSED UPSTREAM
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20120508,reported=2...
: Security
Depends On:
Blocks: 877573
  Show dependency treegraph
 
Reported: 2013-01-09 14:12 EST by Vincent Danen
Modified: 2013-01-09 14:14 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-01-09 14:14:09 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2013-01-09 14:12:28 EST
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.

This is similar to CVE-2012-5532 (see bug #877572 for some of the confusion that happened with regards to the two CVEs).

This is corrected upstream via:

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c

And the fixed code is present in hypervkvpd-0-0.7.el5 as provided by Red Hat Enterprise Linux 5.


Statement:

Not vulnerable. This issue did not affect the versions of hypvervkvpd as shipped with Red Hat Enterprise Linux 5.

Note You need to log in before you can comment on or make changes to this bug.