[stable] tools: hv: Netlink source address validation allows DoS (CVE-2012-5532)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I believe this fix is needed on stable branches 3.2.y, 3.4.y and 3.5.7.z:

commit 95a69adab9acfc3981c504737a2b6578e4d846ef
Author: Tomas Hozza <thozza@xxxxxxxxxx>
Date:   Thu Nov 8 10:53:29 2012 +0100

    tools: hv: Netlink source address validation allows DoS
    
    The source code without this patch caused hypervkvpd to exit when it processed
    a spoofed Netlink packet which has been sent from an untrusted local user.
    Now Netlink messages with a non-zero nl_pid source address are ignored
    and a warning is printed into the syslog.
    
    Signed-off-by: Tomas Hozza <thozza@xxxxxxxxxx>
    Acked-by:  K. Y. Srinivasan <kys@xxxxxxxxxxxxx>
    Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>

-- 
Ben Hutchings
It is easier to write an incorrect program than to understand a correct one.

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]