CVE-2012-6689

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef Patch Vendor Advisory
http://marc.info/?l=linux-netdev&m=134522422125983&w=2 Mailing List Third Party Advisory
http://marc.info/?l=linux-netdev&m=134522422925986&w=2 Mailing List Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5 Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/02/22/10 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/72739 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=848949 Issue Tracking Third Party Advisory
https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef Patch Vendor Advisory
http://marc.info/?l=linux-netdev&m=134522422125983&w=2 Mailing List Third Party Advisory
http://marc.info/?l=linux-netdev&m=134522422925986&w=2 Mailing List Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5 Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/02/22/10 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/72739 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=848949 Issue Tracking Third Party Advisory
https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:46

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef - Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef - Patch, Vendor Advisory
References () http://marc.info/?l=linux-netdev&m=134522422125983&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=linux-netdev&m=134522422125983&w=2 - Mailing List, Third Party Advisory
References () http://marc.info/?l=linux-netdev&m=134522422925986&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=linux-netdev&m=134522422925986&w=2 - Mailing List, Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5 - Release Notes, Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5 - Release Notes, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2015/02/22/10 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/02/22/10 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/72739 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/72739 - Broken Link, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=848949 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=848949 - Issue Tracking, Third Party Advisory
References () https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef - Third Party Advisory () https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef - Third Party Advisory

Information

Published : 2016-05-02 10:59

Updated : 2024-11-21 01:46


NVD link : CVE-2012-6689

Mitre link : CVE-2012-6689

CVE.ORG link : CVE-2012-6689


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-284

Improper Access Control