Bugzilla – Bug 776925
VUL-1: CVE-2012-3520: kernel-source: netlink msg spoofing
Last modified: 2020-01-21 15:53:36 UTC
It has recently been reported [1] that programs that trust 'SCM_CREDENTIALS' in order to e.g. perform privileged tasks, could potentially be tricked into accepting spoofed messages via a flaw in the netlink code. An upstream commit to address this flaw is available at [2]. [1] http://seclists.org/oss-sec/2012/q3/271 [2] http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit; h=e0e3cea46d31
None of our enterprise products are affected by this flaw. Please confirm.
Correct. This was introduced post 3.0, so it does not affect SLES 11 SP2 or earlier SLE products. So affected: openSUSE 12.1 and 12.2.
[2] mentions NetworkManager as well as avahi to be among the applications which might accept such crafted messages. After a quick peek I believe that udevd would be an additional candidate. Revival of CVE-2009-1185 possibly.
Thanks, Marcus!
(In reply to comment #5) > After a quick peek I believe that udevd would be an additional candidate. > Revival of CVE-2009-1185 possibly. I had a closer look into udev out of curiosity. Theoretically, it would be affected too. However, it does fortunately check nl_pid (man 7 netlink) to be 0. So it's safe.
Seems like the fix didn't make the cut for 3.4.11. I think it will be included in the next stable kernel, but in the meantime, here it is. --- Patch-mainline: v3.6-rc3 Git-commit: e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea af_netlink: force credentials passing [CVE-2012-3520] Introduced in v3.2-rc1 by 16e5726 af_unix: dont send SCM_CREDENTIALS by default SLES10_SP4_BRANCH SLE11-SP1-LTSS SLE11-SP2 openSUSE-12.1 all unaffected openSUSE-12.2 applied patches.fixes/af_netlink-force-credentials-passing-CVE-2012-3520.patch
openSUSE-SU-2012:1330-1: An update that solves two vulnerabilities and has 12 fixes is now available. Category: security (important) Bug References: 762693,765230,771392,772566,772831,772923,773406,774523,774859,776925,778630,779432,780624,781134 CVE References: CVE-2012-3412,CVE-2012-3520 Sources used: openSUSE 12.2 (src): kernel-docs-3.4.11-2.16.2, kernel-source-3.4.11-2.16.1, kernel-syms-3.4.11-2.16.1
ok, thanks!
openSUSE-SU-2013:0261-1: An update that solves one vulnerability and has 14 fixes is now available. Category: security (moderate) Bug References: 569991,770763,771392,773831,774859,776925,778630,780624,781327,783615,783965,784192,792500,793671,799209 CVE References: CVE-2012-3520 Sources used: openSUSE 12.2 (src): kernel-docs-3.4.28-2.20.2, kernel-source-3.4.28-2.20.1, kernel-syms-3.4.28-2.20.1