1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
|
PublicDateAtUSN: 2012-04-19
Candidate: CVE-2012-2119
PublicDate: 2013-01-22
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119
http://www.openwall.com/lists/oss-security/2012/04/19/14
http://marc.info/?l=linux-netdev&m=133455718001608&w=2
http://www.spinics.net/lists/netdev/msg197132.html
http://www.ubuntu.com/usn/usn-1529-1
http://www.ubuntu.com/usn/usn-1514-1
Description:
Buffer overflow in the macvtap device driver in the Linux kernel before
3.4.5, when running in certain configurations, allows privileged KVM guest
users to cause a denial of service (crash) via a long descriptor with a
long vector length.
Ubuntu-Description:
A flaw was discovered in the Linux kernel's macvtap device driver, which is
used in KVM (Kernel-based Virtual Machine) to create a network bridge
between host and guest. A privleged user in a guest could exploit this flaw
to crash the host, if the vhost_net module is loaded with the
experimental_zcopytx option enabled.
Notes:
apw> email thread discussing the patch does not conclude on a patch as yet
apw> nothing obviously matching it has hit mainline yet
apw> a second patch set was pushed under the thread below and appears to be
apw> making its way into v3.5
apw> http://www.spinics.net/lists/netdev/msg197132.html
apw> Patch set seems to have hit ending at the sha1 below, it is possible
apw> we need all four patches:
apw> b92946e2919134ebe2a4083e4302236295ea2a73
Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=814278
https://launchpad.net/bugs/987566
Priority: low
Discovered-by:
Assigned-to:
Patches_linux:
break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 3afc9621f15701c557e60f61eba9242bac2771dd
break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 4ef67ebedffa44ed9939b34708ac2fee06d2f65f
break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 02ce04bb3d28c3333231f43bca677228dbc686fe
break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 01d6657b388438def19c8baaea28e742b6ed32ec
break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 b92946e2919134ebe2a4083e4302236295ea2a73
upstream_linux: released (3.5~rc1)
hardy_linux: not-affected
lucid_linux: not-affected
natty_linux: not-affected
oneiric_linux: not-affected
precise_linux: not-affected
devel_linux: not-affected (3.5.0-1.1)
Patches_linux-ec2:
upstream_linux-ec2: released (3.5~rc1)
hardy_linux-ec2: DNE
lucid_linux-ec2: not-affected
natty_linux-ec2: DNE
oneiric_linux-ec2: DNE
precise_linux-ec2: DNE
devel_linux-ec2: DNE
Patches_linux-mvl-dove:
upstream_linux-mvl-dove: released (3.5~rc1)
hardy_linux-mvl-dove: DNE
lucid_linux-mvl-dove: ignored (reached end-of-life)
natty_linux-mvl-dove: DNE
oneiric_linux-mvl-dove: DNE
precise_linux-mvl-dove: DNE
devel_linux-mvl-dove: DNE
Patches_linux-ti-omap4:
upstream_linux-ti-omap4: released (3.5~rc1)
hardy_linux-ti-omap4: DNE
lucid_linux-ti-omap4: DNE
natty_linux-ti-omap4: not-affected
oneiric_linux-ti-omap4: not-affected
precise_linux-ti-omap4: not-affected
devel_linux-ti-omap4: not-affected (3.5.0-1.1)
Patches_linux-lts-backport-maverick:
upstream_linux-lts-backport-maverick: released (3.5~rc1)
hardy_linux-lts-backport-maverick: DNE
lucid_linux-lts-backport-maverick: ignored (reached end-of-life)
natty_linux-lts-backport-maverick: DNE
oneiric_linux-lts-backport-maverick: DNE
precise_linux-lts-backport-maverick: DNE
devel_linux-lts-backport-maverick: DNE
Patches_linux-fsl-imx51:
upstream_linux-fsl-imx51: released (3.5~rc1)
hardy_linux-fsl-imx51: DNE
lucid_linux-fsl-imx51: not-affected
natty_linux-fsl-imx51: DNE
oneiric_linux-fsl-imx51: DNE
precise_linux-fsl-imx51: DNE
devel_linux-fsl-imx51: DNE
Patches_linux-lts-backport-natty:
upstream_linux-lts-backport-natty: released (3.5~rc1)
hardy_linux-lts-backport-natty: DNE
lucid_linux-lts-backport-natty: not-affected
natty_linux-lts-backport-natty: DNE
oneiric_linux-lts-backport-natty: DNE
precise_linux-lts-backport-natty: DNE
devel_linux-lts-backport-natty: DNE
Patches_linux-lts-backport-oneiric:
upstream_linux-lts-backport-oneiric: released (3.5~rc1)
hardy_linux-lts-backport-oneiric: DNE
lucid_linux-lts-backport-oneiric: not-affected
natty_linux-lts-backport-oneiric: DNE
oneiric_linux-lts-backport-oneiric: DNE
precise_linux-lts-backport-oneiric: DNE
devel_linux-lts-backport-oneiric: DNE
Patches_linux-armadaxp:
upstream_linux-armadaxp: released (3.5~rc1)
hardy_linux-armadaxp: DNE
lucid_linux-armadaxp: DNE
natty_linux-armadaxp: DNE
oneiric_linux-armadaxp: DNE
precise_linux-armadaxp: released (3.2.0-1606.9)
devel_linux-armadaxp: not-affected (3.2.0-1606.9)
|