Hyper-V: Netlink source address validation allows DoS
This update fixes the following issues for Hyper-V:
The source code without this patch caused hv_kvp_daemon to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user.
Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the syslog.
This fixes the previous change from CVE-2012-2669.
-
Submitted by
Olaf Hering (olh)
- Reboot is suggested
Fixed bugs
bnc#761200
VUL-1: hyper-v user space daemon netlink origin