First published: Tue Aug 21 2012(Updated: )
A flaw was found in the way Netlink messages without explicitly set SCM_CREDENTIALS were delivered. The kernel passes all-zero SCM_CREDENTIALS ancillary data to the receiver if the sender did not provide such data, instead of including the correct data from the peer (as it is the case with AF_UNIX). Programs that set SO_PASSCRED option on the Netlink socket and rely on SCM_CREDENTIALS for authentication might accept spoofed messages and perform privileged actions on behalf of the unprivileged attacker. Introduced in: <a href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=16e57262">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=16e57262</a> Acknowledgements: Red Hat would like to thank Pablo Neira Ayuso for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.2.29 | |
Linux Kernel | =2.3.2 | |
Linux Kernel | =2.3.20 | |
Linux Kernel | =2.3.21 | |
Linux Kernel | =2.3.22 | |
Linux Kernel | =2.3.23 | |
Linux Kernel | =2.3.24 | |
Linux Kernel | =2.3.25 | |
Linux Kernel | =2.3.26 | |
Linux Kernel | =2.3.27 | |
Linux Kernel | =2.3.28 | |
Linux Kernel | =2.3.29 | |
Linux Kernel | =2.4.33.2 | |
Linux Kernel | =2.6.13.2 | |
Linux Kernel | =2.6.23.2 | |
Linux Kernel | =2.6.33.2 | |
Linux Kernel | =2.6.33.20 | |
Linux Kernel | =3.2 | |
Linux Kernel | =3.2-rc2 | |
Linux Kernel | =3.2-rc3 | |
Linux Kernel | =3.2-rc4 | |
Linux Kernel | =3.2-rc5 | |
Linux Kernel | =3.2-rc6 | |
Linux Kernel | =3.2-rc7 | |
Linux Kernel | =3.2.1 | |
Linux Kernel | =3.2.2 | |
Linux Kernel | =3.2.3 | |
Linux Kernel | =3.2.4 | |
Linux Kernel | =3.2.5 | |
Linux Kernel | =3.2.6 | |
Linux Kernel | =3.2.7 | |
Linux Kernel | =3.2.8 | |
Linux Kernel | =3.2.9 | |
Linux Kernel | =3.2.10 | |
Linux Kernel | =3.2.11 | |
Linux Kernel | =3.2.12 | |
Linux Kernel | =3.2.13 | |
Linux Kernel | =3.2.14 | |
Linux Kernel | =3.2.15 | |
Linux Kernel | =3.2.16 | |
Linux Kernel | =3.2.17 | |
Linux Kernel | =3.2.18 | |
Linux Kernel | =3.2.19 | |
Linux Kernel | =3.2.20 | |
Linux Kernel | =3.2.21 | |
Linux Kernel | =3.2.22 | |
Linux Kernel | =3.2.23 | |
Linux Kernel | =3.2.24 | |
Linux Kernel | =3.2.25 | |
Linux Kernel | =3.2.26 | |
Linux Kernel | =3.2.27 | |
Linux Kernel | =3.2.28 | |
Linux Kernel | =3.3.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3520 is rated as a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2012-3520, update to a patched version of the Linux kernel, specifically versions 5.10.223-1, 5.10.226-1, 6.1.119-1, or later.
CVE-2012-3520 affects multiple versions of the Linux kernel, specifically those prior to version 3.2.29.
CVE-2012-3520 exploits a flaw in Netlink message handling when SCM_CREDENTIALS data is not explicitly set by the sender.
There is no effective workaround for CVE-2012-3520; upgrading to a secure kernel version is the recommended action.