Hyper-V: Netlink source address validation allows DoS

This update fixes the following issues for Hyper-V:
The source code without this patch caused hv_kvp_daemon to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user.
Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the syslog.

This fixes the previous change from CVE-2012-2669.

Fixed bugs
bnc#761200
VUL-1: hyper-v user space daemon netlink origin
Selected Binaries
openSUSE Build Service is sponsored by