High severity7.8NVD Advisory· Published May 2, 2016· Updated May 6, 2026
CVE-2012-6689
CVE-2012-6689
Description
The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdPatchVendor Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5nvdRelease NotesVendor Advisory
- www.openwall.com/lists/oss-security/2015/02/22/10nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/72739nvdBroken LinkThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107befnvdThird Party Advisory
News mentions
0No linked articles in our index yet.