Description
The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
References (8)
Core 8
Core References
Release Notes, Vendor Advisory x_refsource_confirm
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5
Patch, Vendor Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://marc.info/?l=linux-netdev&m=134522422925986&w=2
Broken Link, Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/72739
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=848949
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/02/22/10
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://marc.info/?l=linux-netdev&m=134522422125983&w=2
Third Party Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef
Scores
CVSS v3
7.8
EPSS
0.0003
EPSS Percentile
9.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-284
Status
published
Products (1)
linux/linux_kernel
< 3.0.44
Published
May 02, 2016
Tracked Since
Feb 18, 2026