~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
PublicDateAtUSN: 2012-04-19
Candidate: CVE-2012-2119
PublicDate: 2013-01-22
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119
 http://www.openwall.com/lists/oss-security/2012/04/19/14
 http://marc.info/?l=linux-netdev&m=133455718001608&w=2
 http://www.spinics.net/lists/netdev/msg197132.html
 http://www.ubuntu.com/usn/usn-1529-1
 http://www.ubuntu.com/usn/usn-1514-1
Description:
 Buffer overflow in the macvtap device driver in the Linux kernel before
 3.4.5, when running in certain configurations, allows privileged KVM guest
 users to cause a denial of service (crash) via a long descriptor with a
 long vector length.
Ubuntu-Description:
 A flaw was discovered in the Linux kernel's macvtap device driver, which is
 used in KVM (Kernel-based Virtual Machine) to create a network bridge
 between host and guest. A privleged user in a guest could exploit this flaw
 to crash the host, if the vhost_net module is loaded with the
 experimental_zcopytx option enabled.
Notes:
 apw> email thread discussing the patch does not conclude on a patch as yet
 apw> nothing obviously matching it has hit mainline yet
 apw> a second patch set was pushed under the thread below and appears to be
 apw> making its way into v3.5
 apw>  http://www.spinics.net/lists/netdev/msg197132.html
 apw> Patch set seems to have hit ending at the sha1 below, it is possible
 apw> we need all four patches:
 apw>  b92946e2919134ebe2a4083e4302236295ea2a73
Bugs:
 https://bugzilla.redhat.com/show_bug.cgi?id=814278
 https://launchpad.net/bugs/987566
Priority: low
Discovered-by:
Assigned-to:

Patches_linux:
 break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 3afc9621f15701c557e60f61eba9242bac2771dd
 break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 4ef67ebedffa44ed9939b34708ac2fee06d2f65f
 break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 02ce04bb3d28c3333231f43bca677228dbc686fe
 break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 01d6657b388438def19c8baaea28e742b6ed32ec
 break-fix: 97bc3633bec7ed0fdfbda6b9cf86c51e4f58f8e2 b92946e2919134ebe2a4083e4302236295ea2a73
upstream_linux: released (3.5~rc1)
hardy_linux: not-affected
lucid_linux: not-affected
natty_linux: not-affected
oneiric_linux: not-affected
precise_linux: not-affected
devel_linux: not-affected (3.5.0-1.1)

Patches_linux-ec2:
upstream_linux-ec2: released (3.5~rc1)
hardy_linux-ec2: DNE
lucid_linux-ec2: not-affected
natty_linux-ec2: DNE
oneiric_linux-ec2: DNE
precise_linux-ec2: DNE
devel_linux-ec2: DNE

Patches_linux-mvl-dove:
upstream_linux-mvl-dove: released (3.5~rc1)
hardy_linux-mvl-dove: DNE
lucid_linux-mvl-dove: ignored (reached end-of-life)
natty_linux-mvl-dove: DNE
oneiric_linux-mvl-dove: DNE
precise_linux-mvl-dove: DNE
devel_linux-mvl-dove: DNE

Patches_linux-ti-omap4:
upstream_linux-ti-omap4: released (3.5~rc1)
hardy_linux-ti-omap4: DNE
lucid_linux-ti-omap4: DNE
natty_linux-ti-omap4: not-affected
oneiric_linux-ti-omap4: not-affected
precise_linux-ti-omap4: not-affected
devel_linux-ti-omap4: not-affected (3.5.0-1.1)

Patches_linux-lts-backport-maverick:
upstream_linux-lts-backport-maverick: released (3.5~rc1)
hardy_linux-lts-backport-maverick: DNE
lucid_linux-lts-backport-maverick: ignored (reached end-of-life)
natty_linux-lts-backport-maverick: DNE
oneiric_linux-lts-backport-maverick: DNE
precise_linux-lts-backport-maverick: DNE
devel_linux-lts-backport-maverick: DNE

Patches_linux-fsl-imx51:
upstream_linux-fsl-imx51: released (3.5~rc1)
hardy_linux-fsl-imx51: DNE
lucid_linux-fsl-imx51: not-affected
natty_linux-fsl-imx51: DNE
oneiric_linux-fsl-imx51: DNE
precise_linux-fsl-imx51: DNE
devel_linux-fsl-imx51: DNE

Patches_linux-lts-backport-natty:
upstream_linux-lts-backport-natty: released (3.5~rc1)
hardy_linux-lts-backport-natty: DNE
lucid_linux-lts-backport-natty: not-affected
natty_linux-lts-backport-natty: DNE
oneiric_linux-lts-backport-natty: DNE
precise_linux-lts-backport-natty: DNE
devel_linux-lts-backport-natty: DNE

Patches_linux-lts-backport-oneiric:
upstream_linux-lts-backport-oneiric: released (3.5~rc1)
hardy_linux-lts-backport-oneiric: DNE
lucid_linux-lts-backport-oneiric: not-affected
natty_linux-lts-backport-oneiric: DNE
oneiric_linux-lts-backport-oneiric: DNE
precise_linux-lts-backport-oneiric: DNE
devel_linux-lts-backport-oneiric: DNE

Patches_linux-armadaxp:
upstream_linux-armadaxp: released (3.5~rc1)
hardy_linux-armadaxp: DNE
lucid_linux-armadaxp: DNE
natty_linux-armadaxp: DNE
oneiric_linux-armadaxp: DNE
precise_linux-armadaxp: released (3.2.0-1606.9)
devel_linux-armadaxp: not-affected (3.2.0-1606.9)