The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-246-1 | linux-2.6 security update |
Debian DLA |
DLA-246-2 | linux-2.6 regression update |
EUVD |
EUVD-2012-6531 | The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages. |
Ubuntu USN |
USN-1599-1 | Linux kernel (OMAP4) vulnerability |
Ubuntu USN |
USN-1610-1 | Linux kernel vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T21:36:02.193Z
Reserved: 2015-02-27T00:00:00
Link: CVE-2012-6689
No data.
Status : Deferred
Published: 2016-05-02T10:59:03.560
Modified: 2025-04-12T10:46:40.837
Link: CVE-2012-6689
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN