Re: [stable] tools: hv: Netlink source address validation allows DoS (CVE-2012-5532)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Mar 21, 2013 at 04:16:06AM +0000, Ben Hutchings wrote:
> I believe this fix is needed on stable branches 3.2.y, 3.4.y and 3.5.7.z:
> 
> commit 95a69adab9acfc3981c504737a2b6578e4d846ef
> Author: Tomas Hozza <thozza@xxxxxxxxxx>
> Date:   Thu Nov 8 10:53:29 2012 +0100
> 
>     tools: hv: Netlink source address validation allows DoS
>     
>     The source code without this patch caused hypervkvpd to exit when it processed
>     a spoofed Netlink packet which has been sent from an untrusted local user.
>     Now Netlink messages with a non-zero nl_pid source address are ignored
>     and a warning is printed into the syslog.
>     
>     Signed-off-by: Tomas Hozza <thozza@xxxxxxxxxx>
>     Acked-by:  K. Y. Srinivasan <kys@xxxxxxxxxxxxx>
>     Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>

Applied to 3.4, thanks.

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]