Skip to navigation

CVE Database

CVE-2012-5532

Impact: Low
Public: 2012-06-06
Bugzilla: 877572: CVE-2012-5532 hypervkvpd: Netlink source address validation allows denial of service

Details

The MITRE CVE dictionary describes this issue as:

The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.

Find out more about CVE-2012-5532 from the MITRE CVE dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score: 2.1
Base Metrics: AV:L/AC:L/Au:N/C:N/I:N/A:P
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
RHEL Virtualization version 5 (hypervkvpd) RHSA-2013:0807 May 09, 2013
Red Hat Enterprise Linux version 5 (hypervkvpd) RHSA-2013:0807 May 09, 2013

External References

Acknowledgements

This issue was discovered by Florian Weimer of the Red Hat Product Security Team.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.