CVE-2012-6689

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

20 Jan 2023, 14:30

Type Values Removed Values Added
References (CONFIRM) https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef - Vendor Advisory (CONFIRM) https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef - Third Party Advisory
References (MLIST) http://marc.info/?l=linux-netdev&m=134522422125983&w=2 - (MLIST) http://marc.info/?l=linux-netdev&m=134522422125983&w=2 - Mailing List, Third Party Advisory
References (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef - Vendor Advisory (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef - Patch, Vendor Advisory
References (MLIST) http://marc.info/?l=linux-netdev&m=134522422925986&w=2 - (MLIST) http://marc.info/?l=linux-netdev&m=134522422925986&w=2 - Mailing List, Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=848949 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=848949 - Issue Tracking, Third Party Advisory
References (CONFIRM) http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5 - (CONFIRM) http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5 - Release Notes, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2015/02/22/10 - (MLIST) http://www.openwall.com/lists/oss-security/2015/02/22/10 - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/72739 - (BID) http://www.securityfocus.com/bid/72739 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2016-05-02 10:59

Updated : 2023-12-10 11:46


NVD link : CVE-2012-6689

Mitre link : CVE-2012-6689

CVE.ORG link : CVE-2012-6689


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-284

Improper Access Control