CVE-2012-3520

Published: 03 October 2012

The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.

From the Ubuntu security team

Pablo Neira Ayuso discovered a flaw in the credentials of netlink messages. An unprivileged local attacker could exploit this by getting a netlink based service, that relies on netlink credentials, to perform privileged actions.

Priority

High

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
Patches:
Introduced by 16e5726269611b71c930054ffe9b858c1cea88eb
Fixed by e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
Patches:
Introduced by 16e5726269611b71c930054ffe9b858c1cea88eb
Fixed by Id4f36301d407ef5c8218c5ef9f66d299766cdf57
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
Patches:
Introduced by 16e5726269611b71c930054ffe9b858c1cea88eb
Fixed by Id4f36301d407ef5c8218c5ef9f66d299766cdf57
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
Patches:
Introduced by 16e5726269611b71c930054ffe9b858c1cea88eb
Fixed by Id4f36301d407ef5c8218c5ef9f66d299766cdf57
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
Patches:
Introduced by 16e5726269611b71c930054ffe9b858c1cea88eb
Fixed by Id4f36301d407ef5c8218c5ef9f66d299766cdf57
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.6~rc3)