|Bugzilla:||877572: CVE-2012-5532 hypervkvpd: Netlink source address validation allows denial of service|
The MITRE CVE dictionary describes this issue as:
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|RHEL Virtualization version 5 (hypervkvpd)||RHSA-2013:0807||May 09, 2013|
|Red Hat Enterprise Linux version 5 (hypervkvpd)||RHSA-2013:0807||May 09, 2013|
This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.