Hide Forgot
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. This is similar to CVE-2012-5532 (see bug #877572 for some of the confusion that happened with regards to the two CVEs). This is corrected upstream via: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c And the fixed code is present in hypervkvpd-0-0.7.el5 as provided by Red Hat Enterprise Linux 5. Statement: Not vulnerable. This issue did not affect the versions of hypvervkvpd as shipped with Red Hat Enterprise Linux 5.