Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-6689

Опубликовано: 02 мая 2016
Источник: debian
EPSS Низкий

Описание

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.6.4-1package
linuxfixed3.2.30-1wheezypackage
linux-2.6removedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=848949

  • https://www.openwall.com/lists/oss-security/2015/02/06/13

  • Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef (v3.6-rc5)

EPSS

Процентиль: 9%
0.00034
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 10 лет назад

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.

redhat
около 11 лет назад

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.

CVSS3: 7.8
nvd
почти 10 лет назад

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.

CVSS3: 7.8
github
больше 3 лет назад

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.

EPSS

Процентиль: 9%
0.00034
Низкий