Bug 893728 (CVE-2012-2669) - CVE-2012-2669 hypervkvpd: fails to check origin of netlink messages
Summary: CVE-2012-2669 hypervkvpd: fails to check origin of netlink messages
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2012-2669
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 877573
TreeView+ depends on / blocked
 
Reported: 2013-01-09 19:12 UTC by Vincent Danen
Modified: 2021-02-17 08:12 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-01-09 19:14:09 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2013-01-09 19:12:28 UTC
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.

This is similar to CVE-2012-5532 (see bug #877572 for some of the confusion that happened with regards to the two CVEs).

This is corrected upstream via:

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c

And the fixed code is present in hypervkvpd-0-0.7.el5 as provided by Red Hat Enterprise Linux 5.


Statement:

Not vulnerable. This issue did not affect the versions of hypvervkvpd as shipped with Red Hat Enterprise Linux 5.


Note You need to log in before you can comment on or make changes to this bug.